Lucene search

K
friendsofphpOpenJS FoundationFRIENDSOFPHP:SLIM:SLIM:CVE-2015-2171
HistoryMar 01, 2015 - 9:13 a.m.

PHP object injection attack vulnerability in Slim.

2015-03-0109:13:00
OpenJS Foundation
github.com
4

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.9

Confidence

Low

EPSS

0.006

Percentile

78.7%

https://github.com/slimphp/Slim/blob/master/Slim/Middleware/SessionCookie.php#L127 Generally, it’s a bad idea to blindly unserialize() user-controllable input. https://www.owasp.org/index.php/PHP_Object_Injection EDIT - for people who don’t want to read the whole thread: The SessionCookie class is not used by default, you have to actually write your application to use it. So this means that the unserialize() -> RCE possibility is only for the select few apps that explicitly use this feature. The default is the native session driver, which is of course not vulnerable. The text was updated successfully, but these errors were encountered: All reactions

Affected configurations

Vulners
Node
slimslimRange<2.6.0
VendorProductVersionCPE
slimslim*cpe:2.3:a:slim:slim:*:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.9

Confidence

Low

EPSS

0.006

Percentile

78.7%

Related for FRIENDSOFPHP:SLIM:SLIM:CVE-2015-2171