Vulnerability Description
The actionSendErrorReport method in protected/controllers/SiteController.php in X2Engine 2.8 through 4.1.7 allows remote attackers to conduct PHP object injection and Server-Side Request Forgery (SSRF) attacks via crafted serialized data in the report parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| X2Engine | X2Engine | 2.8 |
Related Weaknesses (CWE)
References
- http://karmainsecurity.com/KIS-2014-09Exploit
- http://packetstormsecurity.com/files/128352/X2Engine-4.1.7-PHP-Object-Injection.Exploit
- http://seclists.org/fulldisclosure/2014/Sep/77Exploit
- http://www.securityfocus.com/archive/1/533513/100/0/threaded
- http://x2community.com/topic/1804-important-security-patch/Patch
- http://karmainsecurity.com/KIS-2014-09Exploit
- http://packetstormsecurity.com/files/128352/X2Engine-4.1.7-PHP-Object-Injection.Exploit
- http://seclists.org/fulldisclosure/2014/Sep/77Exploit
- http://www.securityfocus.com/archive/1/533513/100/0/threaded
- http://x2community.com/topic/1804-important-security-patch/Patch
FAQ
What is CVE-2014-5297?
CVE-2014-5297 is a vulnerability with a CVSS score of 7.5 (HIGH). The actionSendErrorReport method in protected/controllers/SiteController.php in X2Engine 2.8 through 4.1.7 allows remote attackers to conduct PHP object injection and Server-Side Request Forgery (SSRF...
How severe is CVE-2014-5297?
CVE-2014-5297 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-5297?
Check the references section above for vendor advisories and patch information. Affected products include: X2Engine X2Engine.