Vulnerability Details : CVE-2019-19373
An issue was discovered in Squiz Matrix CMS 5.5.0 prior to 5.5.0.3, 5.5.1 prior to 5.5.1.8, 5.5.2 prior to 5.5.2.4, and 5.5.3 prior to 5.5.3.3 where a user can trigger arbitrary unserialization of a PHP object from a packages/cms/page_templates/page_remote_content/page_remote_content.inc POST parameter during processing of a Remote Content page type. This unserialization can be used to trigger the inclusion of arbitrary files on the filesystem (local file inclusion), and results in remote code execution.
Vulnerability category: File inclusionExecute code
Products affected by CVE-2019-19373
- cpe:2.3:a:squiz:matrix:*:*:*:*:*:*:*:*
- cpe:2.3:a:squiz:matrix:*:*:*:*:*:*:*:*
- cpe:2.3:a:squiz:matrix:*:*:*:*:*:*:*:*
- cpe:2.3:a:squiz:matrix:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-19373
0.52%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-19373
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2019-19373
-
The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-19373
-
http://packetstormsecurity.com/files/155671/Squiz-Matrix-CMS-5.5.x.x-Code-Execution-Information-Disclosure.html
Squiz Matrix CMS 5.5.x.x Code Execution / Information Disclosure ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
http://seclists.org/fulldisclosure/2019/Dec/34
Full Disclosure: Squiz Matrix CMS <= 5.5.3.2 - Multiple Issues may lead to Remote Code ExecutionExploit;Mailing List;Third Party Advisory
-
https://matrix.squiz.net/releases/5.5/5.5.3.3
5.5.3.3 - Releases | Squiz Matrix CommunityRelease Notes
-
https://zxsecurity.co.nz/wp-content/uploads/2019/12/ZX%20Security%20Advisory%20-%20Squiz%20Matrix%20CMS%20-%20Multiple%20Vulnerabilities.pdf
Exploit;Third Party Advisory
Jump to