Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Harden InterventionBackend against abuse via PHP Object Injection #663

Open
4 tasks done
mcdruid opened this issue Dec 3, 2024 · 0 comments
Open
4 tasks done

Harden InterventionBackend against abuse via PHP Object Injection #663

mcdruid opened this issue Dec 3, 2024 · 0 comments

Comments

@mcdruid
Copy link

mcdruid commented Dec 3, 2024

Description

I've discussed this with the Silverstripe Security Team before submitting a public PR.

There's a simple Gadget Chain which allows Arbitrary File Deletion in Silverstripe.

This is not directly exploitable by itself, but it's a tool an attacker could use if they find a way to pass unsafe input to unserialize() in a Silverstripe application.

As mentioned it's pretty simple. Here's an example payload:

O:39:"SilverStripe\Assets\InterventionBackend":1:{s:8:"tempPath";s:9:".htaccess";}

Additional context or points of discussion

No response

Validations

  • You intend to implement the feature yourself
  • You have read the contributing guide
  • You strongly believe this feature should be in core, rather than being its own community module
  • You have checked for existing issues or pull requests related to this feature (and didn't find any)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant