CVE-2024-36528: nukeviet Deserialization of Untrusted Data vulnerability
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.58267%
CWE
Published
6/10/2024
Updated
8/21/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| nukeviet/nukeviet | composer | <= 4.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability explicitly mentions code execution via /admin/extensions/download.php and upload.php endpoints. While exact code isn't available, PHP deserialization vulnerabilities typically involve unsafe use of unserialize() on user-controlled input. The CWE-502 classification and RCE impact strongly suggest these files contain unserialize() calls operating on untrusted data without proper validation. The admin context aligns with typical extension management functionality that would handle serialized configuration data.