Open Web Analytics (OWA) before 1.5.7 allows remote attackers to conduct PHP object injection attacks via a crafted serialized object in the owa_event parameter to queue.php.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
https://secuniaresearch.flexerasoftware.com/advisories/56999 | permissions required |
http://www.openwebanalytics.com/?p=388 | release notes patch vendor advisory |
https://secuniaresearch.flexerasoftware.com/secunia_research/2014-3/ | third party advisory |
http://karmainsecurity.com/KIS-2014-03 | third party advisory |
https://www.securityfocus.com/bid/66076 | vdb entry third party advisory |