CVE-2023-28115

Published on: Not Yet Published

Last Modified on: 03/17/2023 10:15:00 PM UTC

CVE-2023-28115 - advisory for GHSA-gq6w-q6wh-jggc

Source: Mitre Source: NIST CVE.ORG Print: PDF PDF

Certain versions of Snappy from KnpLabs contain the following vulnerability:

Snappy is a PHP library allowing thumbnail, snapshot or PDF generation from a url or a html page. Prior to version 1.4.2, Snappy is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the `file_exists()` function. If an attacker can upload files of any type to the server he can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution especially when snappy is used with frameworks with documented POP chains like Laravel/Symfony vulnerable developer code. If a user can control the output file from the `generateFromHtml()` function, it will invoke deserialization. This vulnerability is capable of remote code execution if Snappy is used with frameworks or developer code with vulnerable POP chains. It has been fixed in version 1.4.2.

  • CVE-2023-28115 has been assigned by URL Logo [email protected] to track the vulnerability
  • Affected Vendor/Software: URL Logo KnpLabs - snappy version = < 1.4.2

CVE References

Description Tags Link
fix: security issue GHSA-gq6w-q6wh-jggc · KnpLabs/[email protected] · GitHub github.com
text/html
URL Logo MISC github.com/KnpLabs/snappy/commit/1ee6360cbdbea5d09705909a150df7963a88efd6
Merge pull request #469 from KnpLabs/fix/GHSA-gq6w-q6wh-jggc · KnpLabs/[email protected] · GitHub github.com
text/html
URL Logo MISC github.com/KnpLabs/snappy/commit/b66f79334421c26d9c244427963fa2d92980b5d3
snappy/AbstractGenerator.php at 5126fb5b335ec929a226314d40cd8dad497c3d67 · KnpLabs/snappy · GitHub github.com
text/html
URL Logo MISC github.com/KnpLabs/snappy/blob/5126fb5b335ec929a226314d40cd8dad497c3d67/src/Knp/Snappy/AbstractGenerator.php#L670
PHAR deserialization allowing remote code execution · Advisory · KnpLabs/snappy · GitHub github.com
text/html
URL Logo MISC github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc
Release v1.4.2 · KnpLabs/snappy · GitHub github.com
text/html
URL Logo MISC github.com/KnpLabs/snappy/releases/tag/v1.4.2
fix: security issue GHSA-gq6w-q6wh-jggc by AntoineLelaisant · Pull Request #469 · KnpLabs/snappy · GitHub github.com
text/html
URL Logo MISC github.com/KnpLabs/snappy/pull/469

Known Affected Software

Vendor Product Version
KnpLabs snappy= < 1.4.2

Social Mentions

Source Title Posted (UTC)
Twitter Icon @CVEreport CVE-2023-28115 : Snappy is a PHP library allowing thumbnail, snapshot or PDF generation from a url or a html page.… twitter.com/i/web/status/1… 2023-03-17 22:02:33
Twitter Icon @Robo_Alerts Potentially Critical CVE Detected! CVE-2023-28115 Snappy is a PHP library allowing thumbnail, snapshot or PDF gener… twitter.com/i/web/status/1… 2023-03-17 22:56:00
Reddit Logo Icon /r/netcve CVE-2023-28115 2023-03-17 22:38:17
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report