First published: Mon Jun 17 2019(Updated: )
app/Model/Server.php in MISP 2.4.109 allows remote command execution by a super administrator because the PHP file_exists function is used with user-controlled entries, and phar:// URLs trigger deserialization.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MISP | =2.4.109 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2019-12868.
The severity rating of CVE-2019-12868 is high, with a severity value of 7.2.
CVE-2019-12868 allows remote command execution by a super administrator because the PHP file_exists function is used with user-controlled entries, and phar:// URLs trigger deserialization.
The affected software of CVE-2019-12868 is MISP 2.4.109.
To fix CVE-2019-12868, it is recommended to update to a version of MISP that has the fix, such as version 2.4.110 or later.