CVE-2010-4335
Published Jan 14, 2011
Last updated 14 years ago
Overview
- Description
- The _validatePost function in libs/controller/components/security.php in CakePHP 1.3.x through 1.3.5 and 1.2.8 allows remote attackers to modify the internal Cake cache and execute arbitrary code via a crafted data[_Token][fields] value that is processed by the unserialize function, as demonstrated by modifying the file_map cache to execute arbitrary local files.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cakefoundation:cakephp:1.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EAF987A-B6AE-49BC-9B1F-F91C8BEDE8BB" }, { "criteria": "cpe:2.3:a:cakefoundation:cakephp:1.3:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3FC00F9B-A680-43F9-ABDA-3242D7AC6B3E" }, { "criteria": "cpe:2.3:a:cakefoundation:cakephp:1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C65627A5-D154-48F5-8902-D66899ABC206" }, { "criteria": "cpe:2.3:a:cakefoundation:cakephp:1.3.0:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0D64CF7-9431-410E-B69D-7B2828452739" }, { "criteria": "cpe:2.3:a:cakefoundation:cakephp:1.3.0:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BEAAA812-F8F6-48F2-995E-48929D532DB9" }, { "criteria": "cpe:2.3:a:cakefoundation:cakephp:1.3.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AD6C268-C6DA-4DEE-853D-28E893CDE90E" }, { "criteria": "cpe:2.3:a:cakefoundation:cakephp:1.3.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1C5033B-0E35-4270-AEFD-C7E78E546E53" }, { "criteria": "cpe:2.3:a:cakefoundation:cakephp:1.3.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1119962A-421C-4F35-BCEE-3AD718F7E077" }, { "criteria": "cpe:2.3:a:cakefoundation:cakephp:1.3.0:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4E96540-FF61-4EEF-9768-BA4BE9441426" }, { "criteria": "cpe:2.3:a:cakefoundation:cakephp:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3FE40BC8-8605-46FD-A6B3-B471623F5C14" }, { "criteria": "cpe:2.3:a:cakefoundation:cakephp:1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1602F4C6-4596-44B7-A2D7-CAF7F137748E" }, { "criteria": "cpe:2.3:a:cakefoundation:cakephp:1.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33DA98E6-D097-40F7-B63D-508E0BB593FF" }, { "criteria": "cpe:2.3:a:cakefoundation:cakephp:1.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F002CFD-453B-4E9E-8BC3-9E647EDB0BD4" }, { "criteria": "cpe:2.3:a:cakefoundation:cakephp:1.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "900DC462-B0B1-4205-B988-9DFC51366861" } ], "operator": "OR" } ] } ]