First published: Thu Dec 24 2009(Updated: )
The loadContentFromCookie function in core/Cookie.php in Piwik before 0.5 does not validate strings obtained from cookies before calling the unserialize function, which allows remote attackers to execute arbitrary code or upload arbitrary files via vectors related to the __destruct function in the Piwik_Config class; php://filter URIs; the __destruct functions in Zend Framework, as demonstrated by the Zend_Log destructor; the shutdown functions in Zend Framework, as demonstrated by the Zend_Log_Writer_Mail class; the render function in the Piwik_View class; Smarty templates; and the _eval function in Smarty.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
MediaWiki Matomo | =0.2.25 | |
MediaWiki Matomo | =0.2.26 | |
MediaWiki Matomo | =0.2.27 | |
MediaWiki Matomo | =0.2.28 | |
MediaWiki Matomo | =0.2.29 | |
MediaWiki Matomo | =0.2.30 | |
MediaWiki Matomo | =0.2.31 | |
MediaWiki Matomo | =0.2.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4137 has a high severity rating as it allows remote code execution due to improper cookie validation.
To fix CVE-2009-4137, upgrade to Matomo version 0.5 or later, where the vulnerability has been addressed.
CVE-2009-4137 affects Matomo versions 0.2.25 through 0.2.32.
CVE-2009-4137 can lead to arbitrary code execution or file uploads, compromising the security of the application.
CVE-2009-4137 can be exploited by remote attackers through crafted cookie strings.