Vulnerability Description
app/Model/Server.php in MISP 2.4.109 allows remote command execution by a super administrator because the PHP file_exists function is used with user-controlled entries, and phar:// URLs trigger deserialization.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Misp | Misp | 2.4.109 |
Related Weaknesses (CWE)
References
- https://github.com/MISP/MISP/commit/c42c5fe92783dd306b7600db1f6a25324445b40cPatchThird Party Advisory
- https://zigrin.com/advisories/misp-command-injection-via-phar-deserialization/
- https://github.com/MISP/MISP/commit/c42c5fe92783dd306b7600db1f6a25324445b40cPatchThird Party Advisory
- https://zigrin.com/advisories/misp-command-injection-via-phar-deserialization/
FAQ
What is CVE-2019-12868?
CVE-2019-12868 is a vulnerability with a CVSS score of 7.2 (HIGH). app/Model/Server.php in MISP 2.4.109 allows remote command execution by a super administrator because the PHP file_exists function is used with user-controlled entries, and phar:// URLs trigger deseri...
How severe is CVE-2019-12868?
CVE-2019-12868 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-12868?
Check the references section above for vendor advisories and patch information. Affected products include: Misp Misp.