SB2019050635 - Multiple vulnerabilities in Revive Adserver



SB2019050635 - Multiple vulnerabilities in Revive Adserver

Published: May 6, 2019 Updated: August 8, 2020

Security Bulletin ID SB2019050635
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Open redirect (CVE-ID: CVE-2019-5433)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

A user having access to the UI of a Revive Adserver instance could be tricked into clicking on a specifically crafted admin account-switch.php URL that would eventually lead them to another (unsafe) domain, potentially used for stealing credentials or other phishing attacks. This vulnerability was addressed in version 4.2.0.


2) Deserialization of Untrusted Data (CVE-ID: CVE-2019-5434)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

An attacker could send a specifically crafted payload to the XML-RPC invocation script and trigger the unserialize() call on the "what" parameter in the "openads.spc" RPC method. Such vulnerability could be used to perform various types of attacks, e.g. exploit serialize-related PHP vulnerabilities or PHP object injection. It is possible, although unconfirmed, that the vulnerability has been used by some attackers in order to gain access to some Revive Adserver instances and deliver malware through them to third party websites. This vulnerability was addressed in version 4.2.0.


Remediation

Install update from vendor's website.