GHSA-gv6c-59h4-9pmg

Suggest an improvement
Source
https://github.com/advisories/GHSA-gv6c-59h4-9pmg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-gv6c-59h4-9pmg/GHSA-gv6c-59h4-9pmg.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-gv6c-59h4-9pmg
Aliases
  • CVE-2011-4962
Published
2022-05-17T05:22:06Z
Modified
2024-01-19T17:56:41.613319Z
Summary
Silverstripe CMS Arbitrary Code Execution
Details

code/sitefeatures/PageCommentInterface.php in SilverStripe 2.4.x before 2.4.6 might allow remote attackers to execute arbitrary code via a crafted cookie in a user comment submission, which is not properly handled when it is deserialized.

Database specific
{
    "nvd_published_at": "2012-09-17T17:55:00Z",
    "cwe_ids": [
        "CWE-20",
        "CWE-502"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-01-19T17:34:34Z"
}
References

Affected packages

Packagist / silverstripe/cms

Package

Name
silverstripe/cms
Purl
pkg:composer/silverstripe/cms

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.4.0
Fixed
2.4.6