FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

piwik -- php code execution

Affected packages
piwik < 0.5.1

Details

VuXML ID fcbf56dd-e667-11de-920a-00248c9b4be7
Discovery 2009-12-10
Entry 2009-12-11
Modified 2010-05-02

secunia reports:

Stefan Esser has reported a vulnerability in Piwik, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to the core/Cookie.php script using "unserialize()" with user controlled input. This can be exploited to e.g. execute arbitrary PHP code via the "__wakeup()" or "__destruct()" methods of a serialized object passed via an HTTP cookie.

References

CVE Name CVE-2009-4137
URL http://piwik.org/blog/2009/12/piwik-response-to-shocking-news-in-php-exploitation/
URL http://secunia.com/advisories/37649/
URL http://www.sektioneins.de/de/advisories/advisory-032009-piwik-cookie-unserialize-vulnerability/index.html