Lucene search

K
prionPRIOn knowledge basePRION:CVE-2019-5434
HistoryMay 06, 2019 - 5:29 p.m.

Design/Logic Flaw

2019-05-0617:29:00
PRIOn knowledge base
www.prio-n.com
5

9.7 High

AI Score

Confidence

High

0.281 Low

EPSS

Percentile

96.9%

An attacker could send a specifically crafted payload to the XML-RPC invocation script and trigger the unserialize() call on the “what” parameter in the “openads.spc” RPC method. Such vulnerability could be used to perform various types of attacks, e.g. exploit serialize-related PHP vulnerabilities or PHP object injection. It is possible, although unconfirmed, that the vulnerability has been used by some attackers in order to gain access to some Revive Adserver instances and deliver malware through them to third party websites. This vulnerability was addressed in version 4.2.0.

CPENameOperatorVersion
revive_adserverlt4.2.0

9.7 High

AI Score

Confidence

High

0.281 Low

EPSS

Percentile

96.9%