Skip to main content

This site requires you to update your browser. Your browsing experience maybe affected by not having the most up to date version.

SS-2018-006: Code execution vulnerability

Severity:
Important (?)
Identifier:
SS-2018-006
Versions Affected:
4.0.3, 4.1.0
Versions Fixed:
4.0.4, 4.1.1
Release Date:
2018-05-28

There is a vulnerability whereby arbitrary global functions may be executed if malicious user input is passed through to in the second argument of ViewableData::renderWith. This argument resolves associative arrays as template placehoders. This exploit requires that user code has been written which makes use of the second argument in renderWith and where user input is passed directly as a value in an associative array without sanitisation such as Convert::raw2xml().

ViewableData::customise is not vulnerable.

Reported by Logan Woods of Aura Information Security and Josh Leroux of Theory Tank.