In CMS Made Simple (CMSMS) through 2.2.7, the "file move" operation in the admin dashboard contains an arbitrary file movement vulnerability that can cause DoS, exploitable by an admin user, because config.php can be moved into an incorrect directory.
References
Link | Resource |
---|---|
https://github.com/itodaro/cmsms_cve/blob/master/README.md | Exploit Third Party Advisory |
https://github.com/itodaro/cmsms_cve/blob/master/README.md | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/itodaro/cmsms_cve/blob/master/README.md - Exploit, Third Party Advisory |
Information
Published : 2018-04-27 18:29
Updated : 2024-11-21 03:41
NVD link : CVE-2018-10521
Mitre link : CVE-2018-10521
CVE.ORG link : CVE-2018-10521
JSON object : View
Products Affected
cmsmadesimple
- cms_made_simple
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type