Piwik <= 2.16.0 (saveLayout) PHP 对象注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

The vulnerability can be triggered through the saveLayout() method defined in /plugins/Dashboard/Controller.php: ``` 210. public function saveLayout() 211. { 212. $this->checkTokenInUrl(); 213. 214. $layout = Common::unsanitizeInputValue(Common::getRequestVar('layout')); 215. $layout = strip_tags($layout); 216. $idDashboard = Common::getRequestVar('idDashboard', 1, 'int'); 217. $name = Common::getRequestVar('name', '', 'string'); 218. 219. if (Piwik::isUserIsAnonymous()) { 220. $session = new SessionNamespace("Dashboard"); 221. $session->dashboardLayout = $layout; 222. $session->setExpirationSeconds(1800); ``` User input passed by anonymous users through the "layout" request parameter is being stored into a session variable at line 221, and this is possible by invoking an URL like this: ``` http://[piwik]/index.php?module=Dashboard&action=saveLayout&token_auth=anonymous&layout=[injection]%26%2365536; ``` Since Piwik is not using "utf8mb4" collations for its database, this can be...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息