SeaCMS v6.61 allows Remote Code execution by placing PHP code in a movie picture address (aka v_pic) to /admin/admin_video.php (aka /backend/admin_video.php). The code is executed by visiting /details/index.php. This can also be exploited through CSRF.
References
Link | Resource |
---|---|
http://hexo.imagemlt.xyz/post/seacms-backend-getshell/index.html | Third Party Advisory |
http://hexo.imagemlt.xyz/post/seacms-backend-getshell/index.html | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://hexo.imagemlt.xyz/post/seacms-backend-getshell/index.html - Third Party Advisory |
Information
Published : 2018-07-20 01:29
Updated : 2024-11-21 03:49
NVD link : CVE-2018-14421
Mitre link : CVE-2018-14421
CVE.ORG link : CVE-2018-14421
JSON object : View
Products Affected
seacms
- seacms