themeisle visualizer 可信数据的反序列化

admin 2023-11-30 06:48:16 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
themeisle visualizer 可信数据的反序列化

CVE编号

CVE-2022-2444

利用情况

暂无

补丁情况

N/A

披露时间

2022-07-19
漏洞描述
The Visualizer: Tables and Charts Manager for WordPress plugin for WordPress is vulnerable to deserialization of untrusted input via the 'remote_data' parameter in versions up to, and including 3.7.9. This makes it possible for authenticated attackers with contributor privileges and above to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/Codeinwp/visualizer/blob/master/classes/Visualizer/Module/...
https://github.com/Codeinwp/visualizer/blob/master/classes/Visualizer/Source/Csv.php
https://github.com/Codeinwp/visualizer/compare/v3.7.9...v3.7.10
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&...
https://www.wordfence.com/threat-intel/vulnerabilities/id/d9606d92-8061-4dfc-...
https://www.wordfence.com/vulnerability-advisories/
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 themeisle visualizer * Up to (excluding) 3.7.10
运行在以下环境
系统 alibaba_cloud_linux_2.1903 kernel * Up to (excluding) 4.19.91-25.8.al7
运行在以下环境
系统 amazon_2 kernel * Up to (excluding) 4.14.268-205.500.amzn2
运行在以下环境
系统 amazon_AMI kernel * Up to (excluding) 4.14.268-139.500.amzn1
运行在以下环境
系统 anolis_os_8 kernel * Up to (excluding) 4.19
运行在以下环境
系统 centos_8 kernel * Up to (excluding) 4.18.0-425.3.1.el8
运行在以下环境
系统 kylinos_aarch64_V10SP1 kernel * Up to (excluding) 4.19.90-23.21.v2101.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP2 kernel * Up to (excluding) 4.19.90-25.14.v2101.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP1 kernel * Up to (excluding) 4.19.90-23.21.v2101.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 kernel * Up to (excluding) 4.19.90-25.14.v2101.ky10
运行在以下环境
系统 opensuse_Leap_15.3 kernel * Up to (excluding) 5.3.18-150300.59.60.4
运行在以下环境
系统 opensuse_Leap_15.4 kernel * Up to (excluding) 5.3.18-150300.59.60.4
运行在以下环境
系统 oracle_7 kernel * Up to (excluding) 4.14.35-2047.512.6.el7uek
运行在以下环境
系统 oracle_8 kernel * Up to (excluding) 4.18.0-425.3.1.el8
运行在以下环境
系统 oracle_9 kernel * Up to (excluding) 5.14.0-162.6.1.el9_1
运行在以下环境
系统 redhat_8 kernel * Up to (excluding) 4.18.0-425.3.1.el8
运行在以下环境
系统 redhat_9 kernel * Up to (excluding) 5.14.0-162.6.1.el9_1
运行在以下环境
系统 suse_12_SP5 kernel * Up to (excluding) 4.12.14-122.113.1
CVSS3评分 8.8
  • 攻击路径 网络
  • 攻击复杂度 低
  • 权限要求 低
  • 影响范围 未更改
  • 用户交互 无
  • 可用性 高
  • 保密性 高
  • 完整性 高
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-ID 漏洞类型
CWE-502 可信数据的反序列化
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0