Vulnerability CVE-2014-8791


Published: 2014-12-01   Modified: 2014-12-02

Description:
project/register.php in Tuleap before 7.7, when sys_create_project_in_one_step is disabled, allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via the data parameter.

See advisories in our WLB2 database:
Topic
Author
Date
High
Tuleap <= 7.6-4 (register.php) PHP Object Injection Vulnerability
Egidio Romano
29.11.2014
High
Tuleap PHP Unserialize Code Execution
EgiX
13.12.2014

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:M/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6/10
6.4/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Tuleap -> Tuleap 
Enalean -> Tuleap 

 References:
http://karmainsecurity.com/KIS-2014-13
http://packetstormsecurity.com/files/129309/Tuleap-7.6-4-PHP-Object-Injection.html
http://seclists.org/fulldisclosure/2014/Nov/101
http://www.securityfocus.com/archive/1/534105/100/0/threaded
http://www.securityfocus.com/bid/71335

Copyright 2024, cxsecurity.com

 

Back to Top