PT-2023-2176 · Laravel +3 · Laravel +3
Nightfury99
+1
·
Published
2023-03-17
·
Updated
2023-09-20
·
CVE-2023-28115
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Snappy versions prior to 1.4.2
Description:
The issue is related to PHAR deserialization due to a lack of checking on the protocol before passing it into the `file exists()` function. If an attacker can upload files of any type to the server, they can pass in the `phar://` protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution, especially when Snappy is used with frameworks with documented POP chains like Laravel/Symfony vulnerable developer code. If a user can control the output file from the `generateFromHtml()` function, it will invoke deserialization. The estimated number of potentially affected devices worldwide is not specified. There is no information about real-world incidents where this issue was exploited.
Recommendations:
For Snappy versions prior to 1.4.2, update to version 1.4.2 or later to resolve the issue. As a temporary workaround, consider restricting access to the `generateFromHtml()` function to minimize the risk of exploitation. Additionally, restrict the ability to upload files of any type to the server to prevent potential attacks.
Exploit
Fix
RCE
Deserialization of Untrusted Data
Weakness Enumeration
Related Identifiers
Affected Products
References · 35
- 🔥 https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc⭐ 4417 🔗 437 · Exploit
- 🔥 https://github.com/FriendsOfPHP/security-advisories/blob/master/knplabs/knp-snappy/CVE-2023-41330.yaml⭐ 2049 🔗 306 · Exploit
- 🔥 https://github.com/FriendsOfPHP/security-advisories/blob/master/knplabs/knp-snappy/CVE-2023-28115.yaml⭐ 2049 🔗 306 · Exploit
- https://github.com/KnpLabs/snappy/commit/b66f79334421c26d9c244427963fa2d92980b5d3⭐ 4401 🔗 438 · Patch
- https://github.com/KnpLabs/snappy/commit/1ee6360cbdbea5d09705909a150df7963a88efd6⭐ 4401 🔗 438 · Patch
- https://github.com/KnpLabs/snappy/pull/469⭐ 4401 🔗 438 · Patch
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28115 · Security Note
- https://bdu.fstec.ru/vul/2023-01918 · Security Note
- https://cve.org/CVERecord?id=CVE-2023-28115 · Security Note
- https://security-tracker.debian.org/tracker/source-package/civicrm · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-92rv-4j2h-8mjj · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-41330 · Security Note
- https://osv.dev/vulnerability/GHSA-gq6w-q6wh-jggc · Vendor Advisory
- https://security-tracker.debian.org/tracker/CVE-2023-28115 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-28115 · Security Note