OkayCMS through 2.3.4 Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’) Vulnerability
An unauthenticated attacker can upload a webshell by injecting a malicious php-object via a crafted cookie. This could happen at two places. First in “view/ProductsView.php” using the cookie “price_filter” or in “api/Comparison.php” via the cookie “comparison”. Both cookies will pass untrusted values to a unserialize()-function. The following code shows the vulnerability in “api/Comparison.php”
The information has been provided by Vendor
The original article can be found at:http://seclists.org/fulldisclosure/2019/Dec/15
In OkayCMS through 2.3.4, an unauthenticated attacker can achieve remote code execution by injecting a malicious PHP object via a crafted cookie. This could happen at two places: first in view/ProductsView.php using the cookie price_filter, and second in api/Comparison.php via the cookie comparison.
OkayCMS through 2.3.4