Arbitrary PHP Code Execution via Serialized Object in OpenPNE 3.6.13 and 3.8.9

Arbitrary PHP Code Execution via Serialized Object in OpenPNE 3.6.13 and 3.8.9

CVE-2013-5350 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

The "Remember me" feature in the opSecurityUser::getRememberLoginCookie function in lib/user/opSecurityUser.class.php in OpenPNE 3.6.13 before 3.6.13.1 and 3.8.9 before 3.8.9.1 does not properly validate login data in HTTP Cookie headers, which allows remote attackers to conduct PHP object injection attacks, and execute arbitrary PHP code, via a crafted serialized object.

Learn more about our User Device Pen Test.