CVE-2009-4137
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The loadContentFromCookie function in core/Cookie.php in Piwik before 0.5 does not validate strings obtained from cookies before calling the unserialize function, which allows remote attackers to execute arbitrary code or upload arbitrary files via vectors related to the __destruct function in the Piwik_Config class; php://filter URIs; the __destruct functions in Zend Framework, as demonstrated by the Zend_Log destructor; the shutdown functions in Zend Framework, as demonstrated by the Zend_Log_Writer_Mail class; the render function in the Piwik_View class; Smarty templates; and the _eval function in Smarty.
La función loadContentFromCookie en core/Cookie.php en Piwik before v0.5 no valida cadenas obtenidoas desde cookies antes de llamar a la función unserialize, lo que permite a atacantes remotos ejecuta código o cargar archivos de su elección a través de vectores relacionados con la función the __destruct en la clase Piwik_Config; php://filter URIs; las funciones __destruct en Zend Framework, como quedó demostrado por el destructor Zend_Log; las funciones shutdown en Zend Framework, como quedó demostrado por la clase Zend_Log_Writer_Mail; la función render en la clase Piwik_View; plantillas Smarty ; y la función _eval en Smarty.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-12-01 CVE Reserved
- 2009-12-24 CVE Published
- 2018-01-15 First Exploit
- 2024-09-16 CVE Updated
- 2025-01-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2009/12/09/2 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2009/12/10/1 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2009/12/14/2 | Mailing List |
|
http://www.sektioneins.de/en/advisories/advisory-032009-piwik-cookie-unserialize-vulnerability | X_refsource_misc | |
http://www.suspekt.org/2009/12/09/advisory-032009-piwik-cookie-unserialize-vulnerability | X_refsource_misc | |
http://www.suspekt.org/downloads/POC2009-ShockingNewsInPHPExploitation.pdf | X_refsource_misc |
URL | Date | SRC |
---|---|---|
https://github.com/Alexeyan/CVE-2009-4137 | 2018-01-15 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://dev.piwik.org/trac/changeset/1637 | 2019-11-21 | |
http://piwik.org/blog/2009/12/piwik-response-to-shocking-news-in-php-exploitation | 2019-11-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Matomo Search vendor "Matomo" | Matomo Search vendor "Matomo" for product "Matomo" | 0.2.25 Search vendor "Matomo" for product "Matomo" and version "0.2.25" | - |
Affected
| ||||||
Matomo Search vendor "Matomo" | Matomo Search vendor "Matomo" for product "Matomo" | 0.2.26 Search vendor "Matomo" for product "Matomo" and version "0.2.26" | - |
Affected
| ||||||
Matomo Search vendor "Matomo" | Matomo Search vendor "Matomo" for product "Matomo" | 0.2.27 Search vendor "Matomo" for product "Matomo" and version "0.2.27" | - |
Affected
| ||||||
Matomo Search vendor "Matomo" | Matomo Search vendor "Matomo" for product "Matomo" | 0.2.28 Search vendor "Matomo" for product "Matomo" and version "0.2.28" | - |
Affected
| ||||||
Matomo Search vendor "Matomo" | Matomo Search vendor "Matomo" for product "Matomo" | 0.2.29 Search vendor "Matomo" for product "Matomo" and version "0.2.29" | - |
Affected
| ||||||
Matomo Search vendor "Matomo" | Matomo Search vendor "Matomo" for product "Matomo" | 0.2.30 Search vendor "Matomo" for product "Matomo" and version "0.2.30" | - |
Affected
| ||||||
Matomo Search vendor "Matomo" | Matomo Search vendor "Matomo" for product "Matomo" | 0.2.31 Search vendor "Matomo" for product "Matomo" and version "0.2.31" | - |
Affected
| ||||||
Matomo Search vendor "Matomo" | Matomo Search vendor "Matomo" for product "Matomo" | 0.2.32 Search vendor "Matomo" for product "Matomo" and version "0.2.32" | - |
Affected
|