CVE-2023-46817

critical

Description

An issue was discovered in phpFox before 4.8.14. The url request parameter passed to the /core/redirect route is not properly sanitized before being used in a call to the unserialize() PHP function. This can be exploited by remote, unauthenticated attackers to inject arbitrary PHP objects into the application scope, allowing them to perform a variety of attacks, such as executing arbitrary PHP code.

References

https://www.phpfox.com/blog/

https://karmainsecurity.com/pocs/CVE-2023-46817.php

https://karmainsecurity.com/KIS-2023-12

https://docs.phpfox.com/display/FOX4MAN/phpFox+4.8.14

http://seclists.org/fulldisclosure/2023/Oct/30

Details

Source: Mitre, NVD

Published: 2023-11-03

Updated: 2024-09-06

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical