Show plain JSON{"id": "CVE-2018-1000525", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2018-06-26T16:29:01.557", "references": [{"url": "https://0dd.zone/2018/05/31/OpenPSA-Object-Injection/", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://github.com/flack/openpsa/issues/191", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://0dd.zone/2018/05/31/OpenPSA-Object-Injection/", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/flack/openpsa/issues/191", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-502"}]}], "descriptions": [{"lang": "en", "value": "openpsa contains a PHP Object Injection vulnerability in Form data passed as GET request variables that can result in Possible information disclosure and remote code execution. This attack appear to be exploitable via Specially crafted GET request variable containing serialised PHP object. This vulnerability appears to have been fixed in after commit 097eae0."}, {"lang": "es", "value": "openpsa contiene una vulnerabilidad de inyecci\u00f3n de objetos PHP en los datos Form pasados como variables de petici\u00f3n GET, lo que puede resultar en una divulgaci\u00f3n de informaci\u00f3n y la ejecuci\u00f3n remota de c\u00f3digo. El ataque parece ser explotable mediante una variable de petici\u00f3n GET especialmente manipulada que contiene un objeto PHP serializado. La vulnerabilidad parece haber sido solucionada tras el commit con ID 097eae0."}], "lastModified": "2024-11-21T03:40:07.260", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:openpsa2:openpsa:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43008F2B-02CD-4872-A252-199EE16B04F4"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}