In Fiyo CMS 2.x through 2.0.7, attackers may upload a webshell via the content parameter to "/dapur/apps/app_theme/libs/save_file.php" and then execute code.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/97571 | Third Party Advisory VDB Entry |
https://github.com/Xyntax/POC-T/blob/2.0/script/fiyo2.0.7-getshell.py | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-04-10 17:59
Updated : 2024-02-28 15:44
NVD link : CVE-2017-7625
Mitre link : CVE-2017-7625
CVE.ORG link : CVE-2017-7625
JSON object : View
Products Affected
fiyo
- fiyo_cms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')