VYPR
Critical severity9.8NVD Advisory· Published Jan 20, 2017· Updated May 13, 2026

CVE-2017-5543

CVE-2017-5543

Description

includes/classes/ia.core.users.php in Subrion CMS 4.0.5 allows remote attackers to conduct PHP Object Injection attacks via crafted serialized data in a salt cookie in a login request.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
intelliants/subrionPackagist
>= 4.0.5, < 4.1.04.1.0

Affected products

1

Patches

1
019dee20a38f

#297

https://github.com/intelliants/subrionJanur JangaraevJan 17, 2017via ghsa
1 file changed · +1 1
  • includes/classes/ia.core.users.php+1 1 modified
    @@ -706,7 +706,7 @@ protected function _getSalt()
     
     		if (isset($_COOKIE['salt']) && $_COOKIE['salt'])
     		{
    -			$s = unserialize($_COOKIE['salt']);
    +			$s = json_decode($_COOKIE['salt'], true);
     			if (isset($s['salt']) && isset($s['items']) && $s['salt'] && $s['items'])
     			{
     				$salt = $s;
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.