Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-36825
HistoryJul 11, 2023 - 5:49 p.m.

CVE-2023-36825 Orchid Deserialization of Untrusted Data vulnerability leads to Remote Code Execution

2023-07-1117:49:23
CWE-502
GitHub_M
www.cve.org
orchid
deserialization
untrusted data
remote code execution
laravel
vulnerability
update

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.2%

Orchid is a Laravel package that allows application development of back-office applications, admin/user panels, and dashboards. A vulnerability present starting in version 14.0.0-alpha4 and prior to version 14.5.0 is related to the deserialization of untrusted data from the _state query parameter, which can result in remote code execution. The issue has been addressed in version 14.5.0. Users are advised to upgrade their software to this version or any subsequent versions that include the patch. There are no known workarounds.

CNA Affected

[
  {
    "vendor": "orchidsoftware",
    "product": "platform",
    "versions": [
      {
        "version": ">= 14.0.0-alpha4, < 14.5.0",
        "status": "affected"
      }
    ]
  }
]

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.2%

Related for CVELIST:CVE-2023-36825