Deserialization of Untrusted Data in www/delivery/dxmlrpc.php
Critical
R
Revive Adserver
Submitted None
Actions:
Reported by
mbeccati
Vulnerability Details
Technical details and impact analysis
An attacker could send a specifically crafted payload to the XML-RPC invocation script and trigger the unserialize() call on the first parameter in the "pluginExecute" RPC method.
## Impact
Such vulnerability could be used to perform various types of attacks, e.g. exploit serialize-related PHP vulnerabilities or PHP object injection.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Deserialization of Untrusted Data