Bugtraq mailing list archives
LiveZilla 5.1.2.0 PHP Object Injection
From: zoczus () gmail com
Date: Sat, 14 Dec 2013 23:51:02 GMT
Author: Jakub Zoczek [zoczus () gmail com] CVE Reference: CVE-2013-7034 Product: LiveZilla Vendor: LiveZilla GmbH [http://livezilla.net] Affected version: 5.1.2.0 Severity: Medium CVSSv2 Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N) Status: Fixed 0x01 Background LiveZilla, the widely-used and trusted Live Help and Live Support System. 0x02 Description LiveZilla in version 5.1.2.0 is prone to remote PHP Object Injection. Attacker is able to inject existing class instances using user-controled livezilla cookie which is simply base64 encoded, serialized php object. This may end with unspecified behavior of application, depends on context. Vulnerable file: _lib/functions.global.inc.php , function: setCookieValue() 0x03 Proof of Concept Won't provide. 0x04 Fix Vulnerability was fixed in LiveZilla 5.1.2.1 version. 0x05 Timeline 08.12.2013 - Vendor notified 09.12.2013 - Vendor responded with informations about planned release 10.12.2013 - Version 5.1.2.1 released 15.12.2013 - Public Disclosure
Current thread:
- LiveZilla 5.1.2.0 PHP Object Injection zoczus (Dec 16)