SB2019050635 - Multiple vulnerabilities in Revive Adserver
Published: May 6, 2019 Updated: August 8, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Open redirect (CVE-ID: CVE-2019-5433)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
A user having access to the UI of a Revive Adserver instance could be tricked into clicking on a specifically crafted admin account-switch.php URL that would eventually lead them to another (unsafe) domain, potentially used for stealing credentials or other phishing attacks. This vulnerability was addressed in version 4.2.0.
2) Deserialization of Untrusted Data (CVE-ID: CVE-2019-5434)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
An attacker could send a specifically crafted payload to the XML-RPC invocation script and trigger the unserialize() call on the "what" parameter in the "openads.spc" RPC method. Such vulnerability could be used to perform various types of attacks, e.g. exploit serialize-related PHP vulnerabilities or PHP object injection. It is possible, although unconfirmed, that the vulnerability has been used by some attackers in order to gain access to some Revive Adserver instances and deliver malware through them to third party websites. This vulnerability was addressed in version 4.2.0.
Remediation
Install update from vendor's website.