VYPR
Moderate severityNVD Advisory· Published Sep 17, 2012· Updated Apr 29, 2026

CVE-2011-4962

CVE-2011-4962

Description

code/sitefeatures/PageCommentInterface.php in SilverStripe 2.4.x before 2.4.6 might allow remote attackers to execute arbitrary code via a crafted cookie in a user comment submission, which is not properly handled when it is deserialized.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
silverstripe/cmsPackagist
>= 2.4.0, < 2.4.62.4.6

Affected products

6
  • cpe:2.3:a:silverstripe:silverstripe:2.4.0:*:*:*:*:*:*:*+ 5 more
    • cpe:2.3:a:silverstripe:silverstripe:2.4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:silverstripe:silverstripe:2.4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:silverstripe:silverstripe:2.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:silverstripe:silverstripe:2.4.3:*:*:*:*:*:*:*
    • cpe:2.3:a:silverstripe:silverstripe:2.4.4:*:*:*:*:*:*:*
    • cpe:2.3:a:silverstripe:silverstripe:2.4.5:*:*:*:*:*:*:*

Patches

2
d15e8509b01f

SECURITY Using JSON instead of serialize() to stringify user data in PageCommentsInterface

https://github.com/silverstripe/silverstripe-cmsIngo SchommerSep 8, 2011via ghsa
1 file changed · +3 3
  • code/sitefeatures/PageCommentInterface.php+3 3 modified
    @@ -222,7 +222,7 @@ function PostCommentForm() {
     			foreach($fields as $field) {
     				if(!$field instanceof HiddenField) $visibleFields[] = $field->Name();
     			}
    -			$form->loadDataFrom(unserialize($cookie), false, $visibleFields);
    +			$form->loadDataFrom(Convert::json2array($cookie), false, $visibleFields);
     		}
     
     		return $form;
    @@ -272,7 +272,7 @@ function DeleteAllLink() {
      */
     class PageCommentInterface_Form extends Form {
     	function postcomment($data) {
    -		Cookie::set("PageCommentInterface_Data", serialize($data));
    +		Cookie::set("PageCommentInterface_Data", Convert::raw2json($data));
     
     		// Spam filtering
     		if(SSAkismet::isEnabled()) {
    @@ -333,7 +333,7 @@ function postcomment($data) {
     		$comment->write();
     		
     		unset($data['Comment']);
    -		Cookie::set("PageCommentInterface_Data", serialize($data));
    +		Cookie::set("PageCommentInterface_Data", Convert::raw2json($data));
     		
     		$moderationMsg = _t('PageCommentInterface_Form.AWAITINGMODERATION', "Your comment has been submitted and is now awaiting moderation.");
     		
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.