Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEDdjHfAkToGRQT0b3iZU8RnUXt=mSKbWRaiVx+3LXLDdgFnBQ@mail.gmail.com>
Date: Mon, 14 Apr 2014 10:16:43 +0100
From: Pedro Ribeiro <pedrib@...il.com>
To: oss-security@...ts.openwall.com
Cc: Bernhard Rusch <Bernhard.Rusch@...ments.at>
Subject: Remote code execution in Pimcore CMS

Hi,

I have discovered a PHP object injection in Pimcore CMS.

Depending on the PHP version under which Pimcore is running, it is possible
to achieve remote code execution in the worst case, and arbitrary file
deletion at best.

Please find attached the report, which is also available at

https://github.com/pedrib/PoC/blob/master/pimcore-2.1.0.txt

Can you please provide a CVE number for this?

Thanks in advance.

Regards
Pedro

Content of type "text/html" skipped

View attachment "pimcore-2.1.0.txt" of type "text/plain" (7191 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.