| Title | viames Pair Framework <=1.9.11 PHP Object Injection |
|---|
| Description | Pair Framework has a PHP Object Injection vulnerability as a result of Deserialization of Untrusted Data.
(POP/) Gadget Chains exist in Pair Framework (and its libraries) which allow Object Injection vulnerabilities to be exploited, for example to write arbitrary files. Other attacks may be possible depending on what additional code is used in a given project.
Exploitation of the vulnerability does not require authentication and can be achieved by a single GET request. |
|---|
| Source | ⚠️ https://gist.github.com/mcdruid/1997e10026833d2d1f3e359d75b5912a |
|---|
| User | mcdruid (UID 79710) |
|---|
| Submission | 03/06/2025 22:03 (1 Year ago) |
|---|
| Moderation | 03/16/2025 14:25 (10 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 299875 [viames Pair Framework up to 1.9.11 PHP Object /src/UserRemember.php getCookieContent cookieName deserialization] |
|---|
| Points | 20 |
|---|