3.9 CVE-2025-49597
handcraftedinthealps goodby-csv is a highly memory efficient, flexible and extendable open-source CSV import/export library. Prior to 1.4.3, goodby-csv could be used as part of a chain of methods that is exploitable when an insecure deserialization vulnerability exists in an application. This so-called "gadget chain" presents no direct threat but is a vector that can be used to achieve remote code execution if the application deserializes untrusted data due to another vulnerability. The problem is patched with Version 1.4.3.
https://nvd.nist.gov/vuln/detail/CVE-2025-49597
Categories
CWE-915 : Improperly Controlled Modification of Dynamically-Determined Object Attributes
The product receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control which attributes can be modified. "Mass assignment" is the name of a feature in Ruby on Rails that allows simultaneous modification of multiple object attributes. The "Autobinding" term is used in frameworks such as Spring MVC and ASP.NET MVC. Some PHP application researchers use this term for attacking unsafe use of the unserialize() function, but it is also used for CWE-502. Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.) If available, use the signing/sealing features of the programming language to assure that deserialized data has not been tainted. For example, a hash-based message authentication code (HMAC) could be used to ensure that data has not been modified. For any externally-influenced input, check the input against an allowlist of internal object attributes or fields that are allowed to be modified. Refactor the code so that object attributes or fields do not need to be dynamically identified, and only expose getter/setter functionality for the intended attributes. Application for using LLMs allows modification of a sensitive variable using mass assignment. Mass assignment allows modification of arbitrary attributes using modified URL. Source version control product allows modification of trusted key using mass assignment. Attackers can bypass payment step in e-commerce product. Use of PHP unserialize function on untrusted input allows attacker to modify application configuration. Use of PHP unserialize function on untrusted input in content management system might allow code execution. Use of PHP unserialize function on untrusted input in content management system allows code execution using a crafted cookie value. Content management system written in PHP allows unserialize of arbitrary objects, possibly allowing code execution. Content management system written in PHP allows code execution through page comments. Use of PHP unserialize function on cookie value allows remote code execution or upload of arbitrary files. Content management system written in Python interprets untrusted data as pickles, allowing code execution. Python script allows local users to execute code via pickled data. Python script allows remote attackers to execute arbitrary code using pickled objects. Ruby on Rails allows deserialization of untrusted YAML to execute arbitrary code. Spring framework allows deserialization of objects from untrusted sources to execute arbitrary code. Grails allows binding of arbitrary parameters to modify arbitrary object properties. Incorrect deserialization in web browser allows escaping the sandbox. Media library allows deserialization of objects by untrusted Java applets, leading to arbitrary code execution.
References
security-advisories@github.com
CPE
cpe | start | end |
---|
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
Url |
---|
No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.