The unpack implementation in Swoole version 4.0.4 lacks correct size checks in the deserialization process. An attacker can craft a serialized object to exploit this vulnerability and cause a SEGV.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://github.com/swoole/swoole-src/issues/1882 | vendor advisory issue tracking |
https://github.com/swoole/swoole-src/commit/4cdbce5d9bf2fe596bb6acd7d6611f9e8c253a76 | patch vendor advisory |
https://x-c3ll.github.io/posts/swoole-deserialization-cve-2018-15503/ | third party advisory technical description |