First published: Tue Jan 04 2022(Updated: )
### Impact Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4. Remote attackers may inject auto-loadable arbitrary objects with this vulnerability, and possibly execute existing PHP code on the server. We are aware of a working exploit, which can lead to SQL injection. ### Patches Upgrade to v4.1.6 or later. ### Workarounds Do not use: - `old()` and form_helper - `RedirectResponse::withInput()` and `redirect()->withInput()` ### References - [PHP Object Injection | OWASP](https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection) ### For more information If you have any questions or comments about this advisory: * Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues) * Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/codeigniter4/framework | <4.1.6 | |
Codeigniter Codeigniter | >=4.0.0<4.1.6 | |
composer/codeigniter4/framework | <4.1.6 | 4.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21647 is a vulnerability found in the `old()` function in CodeIgniter4 that allows remote attackers to inject auto-loadable arbitrary objects and potentially execute existing PHP code on the server.
The severity of CVE-2022-21647 is critical with a CVSS score of 9.8.
CVE-2022-21647 affects CodeIgniter4 versions up to and including 4.1.6.
An attacker can exploit CVE-2022-21647 by injecting auto-loadable arbitrary objects into the `old()` function and potentially executing PHP code on the server.
Yes, patches and fixes for CVE-2022-21647 are available. It is recommended to update CodeIgniter4 to a version higher than 4.1.6.