app/Model/Server.php in MISP 2.4.109 allows remote command execution by a super administrator because the PHP file_exists function is used with user-controlled entries, and phar:// URLs trigger deserialization.
References
Link | Resource |
---|---|
https://github.com/MISP/MISP/commit/c42c5fe92783dd306b7600db1f6a25324445b40c | Patch Third Party Advisory |
https://zigrin.com/advisories/misp-command-injection-via-phar-deserialization/ |
Configurations
History
No history.
Information
Published : 2019-06-18 00:15
Updated : 2023-09-28 14:15
NVD link : CVE-2019-12868
Mitre link : CVE-2019-12868
CVE.ORG link : CVE-2019-12868
JSON object : View
Products Affected
misp
- misp
CWE
CWE-502
Deserialization of Untrusted Data