This is a detailed technical writeup describing a PHP Object Injection vulnerability in eFront 3.6.15, caused by unsafe use of unserialize() in the copy.php script. The vulnerability allows authenticated professors to inject malicious serialized objects via the 'transfered' parameter, though exploitation is limited due to lack of useful magic methods.
Classification
Writeup 95%
Attack Type
Deserialization
Target:
eFront 3.6.15
Auth required
Prerequisites:
Authenticated as a Professor · Access to the copy.php script