Vulnerability Details : CVE-2023-28115
Potential exploit
Snappy is a PHP library allowing thumbnail, snapshot or PDF generation from a url or a html page. Prior to version 1.4.2, Snappy is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the `file_exists()` function. If an attacker can upload files of any type to the server he can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution especially when snappy is used with frameworks with documented POP chains like Laravel/Symfony vulnerable developer code. If a user can control the output file from the `generateFromHtml()` function, it will invoke deserialization. This vulnerability is capable of remote code execution if Snappy is used with frameworks or developer code with vulnerable POP chains. It has been fixed in version 1.4.2.
Vulnerability category: Execute code
Products affected by CVE-2023-28115
- cpe:2.3:a:knplabs:snappy:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-28115
3.76%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-28115
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
GitHub, Inc. |
CWE ids for CVE-2023-28115
-
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-28115
-
https://github.com/KnpLabs/snappy/commit/1ee6360cbdbea5d09705909a150df7963a88efd6
fix: security issue GHSA-gq6w-q6wh-jggc · KnpLabs/snappy@1ee6360 · GitHubPatch
-
https://github.com/KnpLabs/snappy/releases/tag/v1.4.2
Release v1.4.2 · KnpLabs/snappy · GitHubRelease Notes
-
https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc
PHAR deserialization allowing remote code execution · Advisory · KnpLabs/snappy · GitHubExploit;Vendor Advisory
-
https://github.com/KnpLabs/snappy/blob/5126fb5b335ec929a226314d40cd8dad497c3d67/src/Knp/Snappy/AbstractGenerator.php#L670
snappy/AbstractGenerator.php at 5126fb5b335ec929a226314d40cd8dad497c3d67 · KnpLabs/snappy · GitHubProduct
-
https://github.com/KnpLabs/snappy/commit/b66f79334421c26d9c244427963fa2d92980b5d3
Merge pull request #469 from KnpLabs/fix/GHSA-gq6w-q6wh-jggc · KnpLabs/snappy@b66f793 · GitHubPatch
-
https://github.com/KnpLabs/snappy/pull/469
fix: security issue GHSA-gq6w-q6wh-jggc by AntoineLelaisant · Pull Request #469 · KnpLabs/snappy · GitHubPatch
Jump to