phpMussel from versions 1.0.0 and less than 1.6.0 has an unserialization vulnerability in PHP's phar wrapper. Uploading a specially crafted file to an affected version allows arbitrary code execution (discovered, tested, and confirmed by myself), so the risk factor should be regarded as very high. Newer phpMussel versions don't use PHP's phar wrapper, and are therefore unaffected. This has been fixed in version 1.6.0.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://github.com/phpMussel/phpMussel/security/advisories/GHSA-qr95-4mq5-r3fh | third party advisory mitigation |
https://github.com/phpMussel/phpMussel/issues/167 | third party advisory patch |
https://github.com/phpMussel/phpMussel/pull/173 | third party advisory patch |
https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4 | release notes third party advisory patch |
https://github.com/phpMussel/phpMussel/security/policy#currently-known-vulnerabilities | third party advisory |