Monstra CMS 3.0.4 does not properly restrict modified Snippet content, as demonstrated by the admin/index.php?id=snippets&action=edit_snippet&filename=google-analytics URI, which allows attackers to execute arbitrary PHP code by placing this code after a <?php substring.
References
Link | Resource |
---|---|
https://github.com/monstra-cms/monstra/issues/455 | Exploit Third Party Advisory |
https://github.com/monstra-cms/monstra/issues/455 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/monstra-cms/monstra/issues/455 - Exploit, Third Party Advisory |
Information
Published : 2018-09-10 13:29
Updated : 2024-11-21 03:51
NVD link : CVE-2018-15886
Mitre link : CVE-2018-15886
CVE.ORG link : CVE-2018-15886
JSON object : View
Products Affected
monstra
- monstra
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')