MyBB <= 1.8.3 远程代码执行漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

<p>Taoguang Chen &lt;<a href="https://twitter.com/chtg57">@chtg57</a>&gt; - Write Date: 2015.4.28 - Release Date: 2017.1.20</p> <blockquote> <p>A type-confusion vulnerability was discovered in GMP deserialization with crafted object's __wakeup() magic method that can be abused for updating any already assigned properties of any already created objects, this result in serious security issues.</p> </blockquote> <h2>Affected Versions</h2> <p>Affected is PHP 5.6 &lt; 5.6.30</p> <h2>Credits</h2> <p>This vulnerability was disclosed by Taoguang Chen.</p> <h2>Description</h2> <p>gmp.c</p> <pre><code>static int gmp_unserialize(zval **object, zend_class_entry *ce, const unsigned char *buf, zend_uint buf_len, zend_unserialize_data *data TSRMLS_DC) /* {{{ */ { ... ALLOC_INIT_ZVAL(zv_ptr); if (!php_var_unserialize(&amp;zv_ptr, &amp;p, max, &amp;unserialize_data TSRMLS_CC) || Z_TYPE_P(zv_ptr) != IS_ARRAY ) { zend_throw_exception(NULL, "Could not unserialize properties", 0 TSRMLS_CC); goto exit;...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息