Tag
#php
Adobe Commerce and Magento Open Source are affected by an XML injection vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction. Versions Affected include Adobe Commerce and Magento Open Source 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8, and earlier. This exploit uses the arbitrary file reading aspect of the issue to impersonate a user.
Xhibiter NFT Marketplace version 1.10.2 suffers from a cross site scripting vulnerability.
eStore CMS version 2.0 suffers from a remote SQL injection vulnerability.
Clenix version 1.0 suffers from an insecure direct object reference vulnerability.
Candy Redis version 2.1.2 appears to suffer from an administrative page disclosure issue.
Agop CMS version 1.0 suffers from an insecure direct object reference vulnerability.
XenForo versions 2.2.15 and below suffer from a remote code execution vulnerability in the Template system.
XenForo versions 2.2.15 and below suffer from a cross site request forgery vulnerability in Widget::actionSave.
### Summary In `torrentpier/library/includes/functions.php`, `get_tracks()` uses the unsafe native PHP serialization format to deserialize user-controlled cookies: https://github.com/torrentpier/torrentpier/blob/84f6c9f4a081d9ffff4c233098758280304bf50f/library/includes/functions.php#L41-L60 ### PoC One can use [`phpggc`](https://github.com/ambionics/phpggc/) and the chain `Guzzle/FW1` to write PHP code to an arbitrary file, and execute commands on the system. For instance, the cookie `bb_t` will be deserialized when browsing to `viewforum.php`.
A malicious Telegram bot is the key to a veritable flourishing garden of nefarious cybercriminal activity, which was discovered via a series of Python packages.