Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:31354
HistoryNov 03, 2014 - 12:00 a.m.

[KIS-2014-11] TestLink <= 1.9.12 (execSetResults.php) PHP Object Injection Vulnerability

2014-11-0300:00:00
vulners.com
43

EPSS

0.032

Percentile

91.2%


TestLink <= 1.9.12 (execSetResults.php) PHP Object Injection Vulnerability

[-] Software Link:

http://testlink.org/

[-] Affected Versions:

Version 1.9.12 and prior versions.

[-] Weakness Description:

The vulnerable code is located in the /lib/execute/execSetResults.php script:

  1.    if&#40;is_string&#40;$args-&gt;filter_status&#41; &amp;&amp; strlen&#40;$args-&gt;filter_status&#41; &gt; 1&#41;
    
  2.    {
    
  3.      $args-&gt;filter_status = unserialize&#40;$args-&gt;filter_status&#41;;
    
  4.    }
    

User input passed through the β€œfilter_result_result” request parameter is not properly sanitized before being used in
a call to the β€œunserialize()” function at line 430. This can be exploited to inject arbitrary PHP objects into the
application scope, and could allow an attacker to delete arbitrary files, carry out Server-Side Request Forgery (SSRF),
SQL Injection, or Local/Remote File Inclusion attacks via specially crafted serialized objects.

[-] Solution:

Update to version 1.9.13 when will be released or apply these hotfixes: http://mantis.testlink.org/view.php?id=6609

[-] Disclosure Timeline:

[06/10/2014] - Issue reported to http://mantis.testlink.org/view.php?id=6651
[07/10/2014] - Issue fixed in the Git repository: http://goo.gl/ptQaqZ
[08/10/2014] - CVE number requested
[11/10/2014] - CVE number assigned
[23/10/2014] - Public disclosure

[-] CVE Reference:

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2014-8081 to this vulnerability.

[-] Credits:

Vulnerability discovered by Egidio Romano.

[-] Original Advisory:

http://karmainsecurity.com/KIS-2014-11

EPSS

0.032

Percentile

91.2%

Related for SECURITYVULNS:DOC:31354