Divisa Proxia Suite 9 < 9.12.16, 9.11.19, 9.10.26, 9.9.8, 9.8.43 and 9.7.10, 10.0 < 10.0.32, and 10.1 < 10.1.5, SparkSpace 1.0 < 1.0.30, 1.1 < 1.1.2, and 1.2 < 1.2.4, and Proxia PHR 1.0 < 1.0.30 and 1.1 < 1.1.2 allows remote code execution via untrusted Java deserialization. The proxia-error cookie is insecurely deserialized in every request (GET or POST). Thus, an unauthenticated attacker can easily craft a seria1.0lized payload in order to execute arbitrary code via the prepareError function in the com.divisait.dv2ee.controller.MVCControllerServlet class of the dv2eemvc.jar component. allows remote code execution via untrusted Java deserialization. The proxia-error cookie is insecurely deserialized in every request (GET or POST). Thus, an unauthenticated attacker can easily craft a serialized payload in order to execute arbitrary code via the prepareError function in the com.divisait.dv2ee.controller.MVCControllerServlet class of the dv2eemvc.jar component. Affected products include Proxia Premium Edition 2017 and Sparkspace.
References
| Link | Resource |
|---|---|
| https://github.com/blackarrowsec/advisories/tree/master/2019/CVE-2019-18956 | Exploit Third Party Advisory |
| https://github.com/blackarrowsec/advisories/tree/master/2019/CVE-2019-18956 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-12-17 16:15
Updated : 2024-11-21 04:33
NVD link : CVE-2019-18956
Mitre link : CVE-2019-18956
CVE.ORG link : CVE-2019-18956
JSON object : View
Products Affected
divisait
- proxia_suite
- proxia_phr
- dv2eemvc
- sparkspace
CWE
CWE-502
Deserialization of Untrusted Data
