OkayCMS through 2.3.4 Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’) Vulnerability

Summary

An unauthenticated attacker can upload a webshell by injecting a malicious php-object via a crafted cookie. This could happen at two places. First in “view/ProductsView.php” using the cookie “price_filter” or in “api/Comparison.php” via the cookie “comparison”. Both cookies will pass untrusted values to a unserialize()-function. The following code shows the vulnerability in “api/Comparison.php”

Credit:

The information has been provided by Vendor

The original article can be found at:http://seclists.org/fulldisclosure/2019/Dec/15


Details

In OkayCMS through 2.3.4, an unauthenticated attacker can achieve remote code execution by injecting a malicious PHP object via a crafted cookie. This could happen at two places: first in view/ProductsView.php using the cookie price_filter, and second in api/Comparison.php via the cookie comparison.

 

Vulnerable Systems:

OkayCMS through 2.3.4

 

CVE Information:

CVE-2019-16885

 

Disclosure Timeline:
Published Date:12/3/2019

Categories: News