Search criteria
2 vulnerabilities by PHPSocialNetwork
CVE-2021-37704 (GCVE-0-2021-37704)
Vulnerability from cvelistv5 – Published: 2021-08-12 20:05 – Updated: 2024-08-04 01:23
VLAI?
Title
Exposed phpinfo() in PhpFastCache
Summary
PhpFastCache is a high-performance backend cache system (packagist package phpfastcache/phpfastcache). In versions before 6.1.5, 7.1.2, and 8.0.7 the `phpinfo()` can be exposed if the `/vendor` is not protected from public access. This is a rare situation today since the vendor directory is often located outside the web directory or protected via server rule (.htaccess, etc). Only the v6, v7 and v8 will be patched respectively in 8.0.7, 7.1.2, 6.1.5. Older versions such as v5, v4 are not longer supported and will **NOT** be patched. As a workaround, protect the `/vendor` directory from public access.
Severity ?
5.4 (Medium)
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| PHPSocialNetwork | phpfastcache |
Affected:
< 6.1.5
Affected: >= 7.0.0, < 7.1.2 Affected: >= 8.0.0, < 8.0.7 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T01:23:01.504Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-cvh5-p6r6-g2qc"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/flextype/flextype/issues/567"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/pull/813"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/pull/814"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/pull/815"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/commit/41a77d0d8f126dbd6fbedcd9e6a82e86cdaafa51"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/blob/master/CHANGELOG.md#807"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://packagist.org/packages/phpfastcache/phpfastcache"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "phpfastcache",
"vendor": "PHPSocialNetwork",
"versions": [
{
"status": "affected",
"version": "\u003c 6.1.5"
},
{
"status": "affected",
"version": "\u003e= 7.0.0, \u003c 7.1.2"
},
{
"status": "affected",
"version": "\u003e= 8.0.0, \u003c 8.0.7"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "PhpFastCache is a high-performance backend cache system (packagist package phpfastcache/phpfastcache). In versions before 6.1.5, 7.1.2, and 8.0.7 the `phpinfo()` can be exposed if the `/vendor` is not protected from public access. This is a rare situation today since the vendor directory is often located outside the web directory or protected via server rule (.htaccess, etc). Only the v6, v7 and v8 will be patched respectively in 8.0.7, 7.1.2, 6.1.5. Older versions such as v5, v4 are not longer supported and will **NOT** be patched. As a workaround, protect the `/vendor` directory from public access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-12T20:05:16",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-cvh5-p6r6-g2qc"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/flextype/flextype/issues/567"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/pull/813"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/pull/814"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/pull/815"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/commit/41a77d0d8f126dbd6fbedcd9e6a82e86cdaafa51"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/blob/master/CHANGELOG.md#807"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://packagist.org/packages/phpfastcache/phpfastcache"
}
],
"source": {
"advisory": "GHSA-cvh5-p6r6-g2qc",
"discovery": "UNKNOWN"
},
"title": "Exposed phpinfo() in PhpFastCache",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2021-37704",
"STATE": "PUBLIC",
"TITLE": "Exposed phpinfo() in PhpFastCache"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "phpfastcache",
"version": {
"version_data": [
{
"version_value": "\u003c 6.1.5"
},
{
"version_value": "\u003e= 7.0.0, \u003c 7.1.2"
},
{
"version_value": "\u003e= 8.0.0, \u003c 8.0.7"
}
]
}
}
]
},
"vendor_name": "PHPSocialNetwork"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "PhpFastCache is a high-performance backend cache system (packagist package phpfastcache/phpfastcache). In versions before 6.1.5, 7.1.2, and 8.0.7 the `phpinfo()` can be exposed if the `/vendor` is not protected from public access. This is a rare situation today since the vendor directory is often located outside the web directory or protected via server rule (.htaccess, etc). Only the v6, v7 and v8 will be patched respectively in 8.0.7, 7.1.2, 6.1.5. Older versions such as v5, v4 are not longer supported and will **NOT** be patched. As a workaround, protect the `/vendor` directory from public access."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-cvh5-p6r6-g2qc",
"refsource": "CONFIRM",
"url": "https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-cvh5-p6r6-g2qc"
},
{
"name": "https://github.com/flextype/flextype/issues/567",
"refsource": "MISC",
"url": "https://github.com/flextype/flextype/issues/567"
},
{
"name": "https://github.com/PHPSocialNetwork/phpfastcache/pull/813",
"refsource": "MISC",
"url": "https://github.com/PHPSocialNetwork/phpfastcache/pull/813"
},
{
"name": "https://github.com/PHPSocialNetwork/phpfastcache/pull/814",
"refsource": "MISC",
"url": "https://github.com/PHPSocialNetwork/phpfastcache/pull/814"
},
{
"name": "https://github.com/PHPSocialNetwork/phpfastcache/pull/815",
"refsource": "MISC",
"url": "https://github.com/PHPSocialNetwork/phpfastcache/pull/815"
},
{
"name": "https://github.com/PHPSocialNetwork/phpfastcache/commit/41a77d0d8f126dbd6fbedcd9e6a82e86cdaafa51",
"refsource": "MISC",
"url": "https://github.com/PHPSocialNetwork/phpfastcache/commit/41a77d0d8f126dbd6fbedcd9e6a82e86cdaafa51"
},
{
"name": "https://github.com/PHPSocialNetwork/phpfastcache/blob/master/CHANGELOG.md#807",
"refsource": "MISC",
"url": "https://github.com/PHPSocialNetwork/phpfastcache/blob/master/CHANGELOG.md#807"
},
{
"name": "https://packagist.org/packages/phpfastcache/phpfastcache",
"refsource": "MISC",
"url": "https://packagist.org/packages/phpfastcache/phpfastcache"
}
]
},
"source": {
"advisory": "GHSA-cvh5-p6r6-g2qc",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2021-37704",
"datePublished": "2021-08-12T20:05:16",
"dateReserved": "2021-07-29T00:00:00",
"dateUpdated": "2024-08-04T01:23:01.504Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-16774 (GCVE-0-2019-16774)
Vulnerability from cvelistv5 – Published: 2019-12-12 23:05 – Updated: 2024-08-05 01:24
VLAI?
Title
Object injection in cookie driver
Summary
In phpfastcache before 5.1.3, there is a possible object injection vulnerability in cookie driver.
Severity ?
4.4 (Medium)
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| PHPSocialNetwork | phpfastcache |
Affected:
< 5.1.3 , < 5.1.3
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T01:24:47.897Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-484f-743f-6jx2"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/commit/c4527205cb7a402b595790c74310791f5b04a1a4"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "phpfastcache",
"vendor": "PHPSocialNetwork",
"versions": [
{
"lessThan": "5.1.3",
"status": "affected",
"version": "\u003c 5.1.3",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In phpfastcache before 5.1.3, there is a possible object injection vulnerability in cookie driver."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-12T23:05:14",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-484f-743f-6jx2"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/commit/c4527205cb7a402b595790c74310791f5b04a1a4"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13"
}
],
"source": {
"advisory": "GHSA-484f-743f-6jx2",
"discovery": "UNKNOWN"
},
"title": "Object injection in cookie driver",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2019-16774",
"STATE": "PUBLIC",
"TITLE": "Object injection in cookie driver"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "phpfastcache",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "\u003c 5.1.3",
"version_value": "5.1.3"
}
]
}
}
]
},
"vendor_name": "PHPSocialNetwork"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In phpfastcache before 5.1.3, there is a possible object injection vulnerability in cookie driver."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-484f-743f-6jx2",
"refsource": "CONFIRM",
"url": "https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-484f-743f-6jx2"
},
{
"name": "https://github.com/PHPSocialNetwork/phpfastcache/commit/c4527205cb7a402b595790c74310791f5b04a1a4",
"refsource": "MISC",
"url": "https://github.com/PHPSocialNetwork/phpfastcache/commit/c4527205cb7a402b595790c74310791f5b04a1a4"
},
{
"name": "https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13",
"refsource": "MISC",
"url": "https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13"
}
]
},
"source": {
"advisory": "GHSA-484f-743f-6jx2",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2019-16774",
"datePublished": "2019-12-12T23:05:15",
"dateReserved": "2019-09-24T00:00:00",
"dateUpdated": "2024-08-05T01:24:47.897Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}