You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The code above displays that the XML file is user controlled. This can allow an attacker to create a denial of service scenario for all versions of PHP prior to 5.6.21
The Issue
A specially crafted XML file can be used to create a denial of service scenario within the openpsa admin portal.
Vulnerable Code
openpsa/lib/net/nemein/rss/handler/admin.php
Lines 93 to 94 in bf990b9
The above code displays that an XML file is being parsed.
openpsa/lib/net/nemein/rss/handler/admin.php
Lines 85 to 87 in bf990b9
The code above displays that the XML file is user controlled. This can allow an attacker to create a denial of service scenario for all versions of PHP prior to 5.6.21
Minimum PHP requirements for openpsa project:
http://www.openpsa2.org/resources/installing-openpsa/
CVE for vulnerable PHP function:
https://www.cvedetails.com/cve/CVE-2016-4539/
The text was updated successfully, but these errors were encountered: