Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
A specially crafted XML file can be used to create a denial of service scenario within the openpsa admin portal.
openpsa/lib/net/nemein/rss/handler/admin.php
Lines 93 to 94 in bf990b9
Lines 85 to 87 in bf990b9
Minimum PHP requirements for openpsa project: http://www.openpsa2.org/resources/installing-openpsa/
CVE for vulnerable PHP function: https://www.cvedetails.com/cve/CVE-2016-4539/
The text was updated successfully, but these errors were encountered:
4974a26
No branches or pull requests
The Issue
A specially crafted XML file can be used to create a denial of service scenario within the openpsa admin portal.
Vulnerable Code
openpsa/lib/net/nemein/rss/handler/admin.php
Lines 93 to 94 in bf990b9
The above code displays that an XML file is being parsed.
openpsa/lib/net/nemein/rss/handler/admin.php
Lines 85 to 87 in bf990b9
The code above displays that the XML file is user controlled. This can allow an attacker to create a denial of service scenario for all versions of PHP prior to 5.6.21
Minimum PHP requirements for openpsa project:
http://www.openpsa2.org/resources/installing-openpsa/
CVE for vulnerable PHP function:
https://www.cvedetails.com/cve/CVE-2016-4539/
The text was updated successfully, but these errors were encountered: