CVE-2021-36567: Deserialization of Untrusted Data in topthink/framework
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.86807%
CWE
Published
12/7/2021
Updated
2/1/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
topthink/framework | composer | <= 6.0.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability arises from deserializing untrusted data (via user-controlled unserialize() calls in application code) that instantiates a CacheStore object. The CacheStore's __destruct method (from AbstractCache) invokes save(), which interacts with a File cache driver configured with attacker-controlled 'serialize' options (e.g., system()). This chain allows arbitrary command execution. The key vulnerable function is the __destruct method in the framework's CacheStore class, which initiates the dangerous deserialization chain.