An issue was discovered in Squiz Matrix CMS 5.5.0 prior to 5.5.0.3, 5.5.1 prior to 5.5.1.8, 5.5.2 prior to 5.5.2.4, and 5.5.3 prior to 5.5.3.3 where a user can trigger arbitrary unserialization of a PHP object from a packages/cms/page_templates/page_remote_content/page_remote_content.inc POST parameter during processing of a Remote Content page type. This unserialization can be used to trigger the inclusion of arbitrary files on the filesystem (local file inclusion), and results in remote code execution.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/155671/Squiz-Matrix-CMS-5.5.x.x-Code-Execution-Information-Disclosure.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/Dec/34 | Exploit Mailing List Third Party Advisory |
https://matrix.squiz.net/releases/5.5/5.5.3.3 | Release Notes |
https://zxsecurity.co.nz/wp-content/uploads/2019/12/ZX%20Security%20Advisory%20-%20Squiz%20Matrix%20CMS%20-%20Multiple%20Vulnerabilities.pdf | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-12-11T19:04:12
Updated: 2019-12-16T17:06:14
Reserved: 2019-11-28T00:00:00
Link: CVE-2019-19373
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-12-11T20:15:10.897
Modified: 2019-12-19T21:19:05.413
Link: CVE-2019-19373
JSON object: View
Redhat Information
No data.
CWE