An issue was discovered in TCPDF before 6.2.22. Attackers can trigger deserialization of arbitrary data via the phar:// wrapper.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://github.com/tecnickcom/TCPDF/commit/1861e33fe05f653b67d070f7c106463e7a5c26ed | third party advisory patch |
http://seclists.org/fulldisclosure/2019/Mar/36 | third party advisory mailing list |
http://packetstormsecurity.com/files/152200/TCPDF-6.2.19-Deserialization-Remote-Code-Execution.html | vdb entry third party advisory |
https://github.com/LimeSurvey/LimeSurvey/commit/1cdd78d27697b3150bb44aaa7af1a81062a591a5 | third party advisory patch |
https://www.exploit-db.com/exploits/46634/ | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/152360/LimeSurvey-Deserialization-Remote-Code-Execution.html | exploit vdb entry third party advisory |
https://contao.org/en/news/security-vulnerability-cve-2018-17057.html | third party advisory |