WordPress Plugin Vulnerabilities

Formidable Forms < 6.2 - Unauthenticated PHP Object Injection

Description

The plugin unserializes user input, which could allow anonymous users to perform PHP Object Injection when a suitable gadget is present.

Proof of Concept

To simulate a gadget chain, put the following code in a plugin:

class Evil {
  public function __wakeup() : void {
    die("Arbitrary deserialization");
  }
}

1. Active this plugin and create a simple form.
2. Embed form in existing page.
3. Use anonymous user to fill in the text field with O:4:"Evil":0:{} and submit that form.
4. You will see the "Arbitrary deserialization" result.

Affects Plugins

Fixed in 6.2

References

Classification

Type
OBJECT INJECTION
CWE
CVSS

Miscellaneous

Original Researcher
Nguyen Huu Do
Submitter
Nguyen Huu Do
Verified
Yes

Timeline

Publicly Published
2023-04-06 (about 1 years ago)
Added
2023-04-06 (about 1 years ago)
Last Updated
2023-04-06 (about 1 years ago)

Other