logo

CVE-2017-1000053 plug

Package

Manager: erlang
Name: plug
Vulnerable Version: >=0 <1.0.4 || >=1.1.0 <1.1.7 || >=1.2.0 <1.2.3 || >=1.3.0 <1.3.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.01151 pctl0.77694

Details

Arbitrary Code Execution in Cookie Serialization The default serialization used by Plug session may result in code execution in certain situations. Keep in mind, however, the session cookie is signed and this attack can only be exploited if the attacker has access to your secret key as well as your signing/encryption salts. We recommend users to change their secret key base and salts if they suspect they have been leaked, regardless of this vulnerability.

Metadata

Created: 2022-04-12T21:23:43Z
Modified: 2022-04-12T21:23:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-5v4m-c73v-c7gq/GHSA-5v4m-c73v-c7gq.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-5v4m-c73v-c7gq
Finding: F096
Auto approve: 1