CodeIgniter before 3.0 and Kohana 3.2.3 and earlier and 3.3.x through 3.3.2 make it easier for remote attackers to spoof session cookies and consequently conduct PHP object injection attacks by leveraging use of standard string comparison operators to compare cryptographic hashes.
CPE | Name | Operator | Version |
---|---|---|---|
codeigniter/framework | eq | 3.0rc2 | |
kohana/core | eq | 3.3.2 | |
kohana/core | eq | 3.2.3 | |
codeigniter/framework | eq | 3.0rc | |
codeigniter/framework | eq | 3.0rc3 | |
kohana/core | eq | 3.3.1 |
packetstormsecurity.com/files/130609/Seagate-Business-NAS-Unauthenticated-Remote-Command-Execution.html
seclists.org/fulldisclosure/2014/May/54
github.com/bcit-ci/CodeIgniter/blob/2.2.6/system/libraries/Session.php#L159
github.com/kohana/core/commit/66b409a6da2960130888989534ff1799532b8f32
github.com/kohana/core/pull/492
nvd.nist.gov/vuln/detail/CVE-2014-8684
web.archive.org/web/20140802041151/https://scott.arciszewski.me/research/full/php-framework-timing-attacks-object-injection