GHSA-h479-2mv4-5c26

Suggest an improvement
Source
https://github.com/advisories/GHSA-h479-2mv4-5c26
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-h479-2mv4-5c26/GHSA-h479-2mv4-5c26.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-h479-2mv4-5c26
Aliases
Published
2022-10-11T20:45:42Z
Modified
2023-11-08T04:10:18.146991Z
Severity
  • 7.7 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L CVSS Calculator
Summary
melisplatform/melis-front vulnerable to deserialization of untrusted data
Details

Impact

Attackers can deserialize arbitrary data on affected versions of melisplatform/melis-front, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication.

Users should immediately upgrade to melisplatform/melis-front >= 5.0.1.

Patches

This issue was addressed by restricting allowed classes when deserializing user-controlled data.

References

  • https://github.com/melisplatform/melis-front/commit/89ae612d5f1f7aa2fb621ee8de27dffe1feb851e

For more information

If you have any questions or comments about this advisory, you can contact: - The original reporters, by sending an email to vulnerability.research [at] sonarsource.com; - The maintainers, by opening an issue on this repository.

Database specific
{
    "nvd_published_at": "2022-10-12T23:15:00Z",
    "github_reviewed_at": "2022-10-11T20:45:42Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-502"
    ]
}
References

Affected packages

Packagist / melisplatform/melis-front

Package

Name
melisplatform/melis-front
Purl
pkg:composer/melisplatform/melis-front

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0.1

Affected versions

v2.*

v2.1
v2.1.1
v2.2.0
v2.2.1
v2.3.0
v2.4.0
v2.5.0

v3.*

v3.0.0
v3.0.1
v3.0.2
v3.0.3
v3.0.4
v3.0.5
v3.0.6
v3.0.7
v3.0.8
v3.0.9
v3.1.0
v3.1.1
v3.1.2
v3.1.3
v3.1.4
v3.1.5
v3.1.6
v3.2.0
v3.2.1
v3.2.2
v3.2.3
v3.2.4
v3.2.5
v3.2.6
v3.2.7
v3.2.8
v3.2.9

v4.*

v4.0.0
v4.0.1
v4.0.2
v4.0.3
v4.0.4
v4.0.5
v4.0.6
v4.0.7
v4.0.8
v4.1.0
v4.1.1
v4.1.2

v5.*

v5.0.0