Fat-Free Framework arbitrary code execution
Critical severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Apr 25, 2024
Description
Published by the National Vulnerability Database
Mar 11, 2020
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Apr 25, 2024
Last updated
Apr 25, 2024
In Fat-Free Framework 3.7.1, attackers can achieve arbitrary code execution if developers choose to pass user controlled input (e.g.,
$_REQUEST
,$_GET
, or$_POST
) to the framework's Clear method.References