CVE-2022-39298 – melisplatform/melis-front
Package
Manager: composer
Name: melisplatform/melis-front
Vulnerable Version: >=0 <5.0.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00119 pctl0.31538
Details
melisplatform/melis-front vulnerable to deserialization of untrusted data ### Impact Attackers can deserialize arbitrary data on affected versions of `melisplatform/melis-front`, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-front` >= 5.0.1. ### Patches This issue was addressed by restricting allowed classes when deserializing user-controlled data. ### References - https://github.com/melisplatform/melis-front/commit/89ae612d5f1f7aa2fb621ee8de27dffe1feb851e ### For more information If you have any questions or comments about this advisory, you can contact: - The original reporters, by sending an email to vulnerability.research [at] sonarsource.com; - The maintainers, by opening an issue on this repository.
Metadata
Created: 2022-10-11T20:45:42Z
Modified: 2022-10-13T20:10:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-h479-2mv4-5c26/GHSA-h479-2mv4-5c26.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-h479-2mv4-5c26
Finding: F096
Auto approve: 1