e107 2.1.2 allows PHP Object Injection with resultant SQL injection, because usersettings.php uses unserialize without an HMAC.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://demo.ripstech.com/projects/e107_2.1.2 | third party advisory |
https://blog.ripstech.com/2016/e107-sql-injection-through-object-injection/ | third party advisory exploit |