vendor:
Pimcore CMS
by:
Pedro Ribeiro
7,5
CVSS
HIGH
Remote code execution in Pimcore CMS via unserialize() PHP object injection (CVE-2014-2921) and Arbitrary file deletion in Pimcore CMS via unserialize() PHP object injection (CVE-2014-2922)
502
CWE
Product Name: Pimcore CMS
Affected Version From: 1.4.9
Affected Version To: 2.1.0
Patch Exists: YES
Related CWE: CVE-2014-2921, CVE-2014-2922
CPE: a:pimcore:pimcore
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Any PHP version
2014
Vulnerabilities in Pimcore 1.4.9 to 2.1.0 (inclusive)
This vulnerability can be exploited by sending a base64 encoded payload as the 'token' parameter to the newsletter unsubscribe page of the target site. Payload [1] abuses several Zend classes to achieve remote code execution (based on Stefan Esser's technique in [2] and Egidio Romano's exploit code from [3]). Payload [4] abuses Zend_Http_Response_Stream to delete a file in /tmp/deleteme and works in all PHP versions.
Mitigation:
Upgrade to version 2.2.0 or higher