The "Remember me" feature in the opSecurityUser::getRememberLoginCookie function in lib/user/opSecurityUser.class.php in OpenPNE 3.6.13 before 3.6.13.1 and 3.8.9 before 3.8.9.1 does not properly validate login data in HTTP Cookie headers, which allows remote attackers to conduct PHP object injection attacks, and execute arbitrary PHP code, via a crafted serialized object.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.openpne.jp/archives/12293/ | vendor advisory |
http://jvn.jp/en/jp/JVN69986880/index.html | third party advisory |
http://secunia.com/advisories/54043 | third party advisory vendor advisory |
http://secunia.com/secunia_research/2014-1/ | vendor advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000009 | third party advisory |