Lucene search

K
friendsofphpOpenJS FoundationFRIENDSOFPHP:WALLABAG
HistoryJan 01, 1970 - 12:00 a.m.

Attackers can trigger deserialization of arbitrary data via the phar:// wrapper.

1970-01-0100:00:00
OpenJS Foundation
github.com
16

EPSS

0.267

Percentile

96.8%

There was a problem hiding this comment. Choose a reason for hiding this comment The reason will be displayed to describe this comment to others. Learn more. Choose a reason Spam Abuse Off Topic Outdated Duplicate Resolved Hide comment I’m afraid this change is wrong. file_exists() is not the only method vulnerable for this kind of attack. It is also the getimagesize() call in line 6856, which can now be exploited again due to your deletions of lines 6848 to 6856 (my fix from #94).