#3801 - Unauthenticated Remote Code Execution
| Identifier | #3801 |
|---|---|
| Issue type | Major issue (breaks an entire feature) |
| Title | Unauthenticated Remote Code Execution |
| Status | Completed |
| Tags |
Type: Security (custom) |
| Handling member | Chris Graham |
| Addon | core |
| Description | The use of the unserialize function in multiple places allows an unauthenticated attacker to execute arbitrary code. The check done in secure_serialized_data is straightforward to bypass. A fix replacing unserialize with json_decode should be released as soon as possible. A python script that exploits this vulnerability against hosts with a PHP version < 7.2 is attached. |
| Steps to reproduce | |
| Funded? | No |
The system will post a comment when this issue is modified (e.g., status changes). To be notified of this, click "Enable comment notifications".


Comments
Thank you for withholding up to that point. I'll make sure you get credit on the announcement. If you have a request for a name to be credited against (i.e. not just 'RandomGuy'), I'll make sure that's included.
Announced in https://compo.sr/news/view/announcements/security-vulnerability.htm.