| Titre | Aidigu <=1.8.2 PHP object deserialization |
|---|
| Description | Aidigu (≤1.8.2) suffers from an arbitrary PHP object deserialization vulnerability in application/common.php, where untrusted cookie data is unserialized without validation. Attackers can exploit this to achieve remote code execution on the server by sending a specially crafted serialized payload in the rememberMe cookie. |
|---|
| La source | ⚠️ https://note-hxlab.wetolink.com/share/Bon2P1OSuNDc |
|---|
| Utilisateur | YELEIPENG (UID 73615) |
|---|
| Soumission | 03/07/2025 05:36 (il y a 10 mois) |
|---|
| Modérer | 07/07/2025 15:26 (4 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 315165 [lty628 Aidigu jusqu’à 1.8.2 PHP Object /application/common.php checkUserCookie rememberMe élévation de privilèges] |
|---|
| Points | 19 |
|---|