Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 06 Dec 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Clipbucket
Clipbucket clickbucket |
|
CPEs | cpe:2.3:a:clipbucket:clickbucket:*:*:*:*:*:*:*:* | |
Vendors & Products |
Clipbucket
Clipbucket clickbucket |
|
Metrics |
ssvc
|
Fri, 06 Dec 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ClipBucket V5 provides open source video hosting with PHP. ClipBucket-v5 Version 2.0 to Version 5.5.1 Revision 199 are vulnerable to PHP Deserialization vulnerability. The vulnerability exists in upload/photo_upload.php within the decode_key function. User inputs were supplied to this function without sanitization via collection GET parameter and photoIDS POST parameter respectively. The decode_key function invokes PHP unserialize function as defined in upload/includes/classes/photos.class.php. As a result, it is possible for an adversary to inject maliciously crafted PHP serialized object and utilize gadget chains to cause unexpected behaviors of the application. This vulnerability is fixed in 5.5.1 Revision 200. | |
Title | Untrusted Deserialization in ClipBucket-v5 Version 2.0 to 5.5.1 Revision 199 | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-12-06T15:46:40.873Z
Reserved: 2024-11-29T18:02:16.754Z
Link: CVE-2024-54135

Updated: 2024-12-06T15:46:33.301Z

Status : Received
Published: 2024-12-06T16:15:22.340
Modified: 2024-12-06T16:15:22.340
Link: CVE-2024-54135

No data.

No data.