An issue was discovered in phpFox before 4.8.14. The url request parameter passed to the /core/redirect route is not properly sanitized before being used in a call to the unserialize() PHP function. This can be exploited by remote, unauthenticated attackers to inject arbitrary PHP objects into the application scope, allowing them to perform a variety of attacks, such as executing arbitrary PHP code.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://www.phpfox.com/blog/ | product |
http://seclists.org/fulldisclosure/2023/Oct/30 | mailing list third party advisory exploit |
https://karmainsecurity.com/pocs/CVE-2023-46817.php | third party advisory exploit |
https://karmainsecurity.com/KIS-2023-12 | third party advisory |
https://docs.phpfox.com/display/FOX4MAN/phpFox+4.8.14 | product |