CVE-2018-19520

An issue was discovered in SDCMS 1.6 with PHP 5.x. app/admin/controller/themecontroller.php uses a check_bad function in an attempt to block certain PHP functions such as eval, but does not prevent use of preg_replace 'e' calls, allowing users to execute arbitrary code by leveraging access to admin template management.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sdcms:sdcms:1.6:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:58

Type Values Removed Values Added
References () https://blog.whiterabbitxyj.com/cve/SDCMS_1.6_code_execution.doc - Exploit, Third Party Advisory () https://blog.whiterabbitxyj.com/cve/SDCMS_1.6_code_execution.doc - Exploit, Third Party Advisory
References () https://github.com/WhiteRabbitc/WhiteRabbitc.github.io/blob/master/cve/SDCMS_1.6_code_execution.doc - Exploit, Third Party Advisory () https://github.com/WhiteRabbitc/WhiteRabbitc.github.io/blob/master/cve/SDCMS_1.6_code_execution.doc - Exploit, Third Party Advisory

Information

Published : 2018-11-25 20:29

Updated : 2024-11-21 03:58


NVD link : CVE-2018-19520

Mitre link : CVE-2018-19520

CVE.ORG link : CVE-2018-19520


JSON object : View

Products Affected

php

  • php

sdcms

  • sdcms
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')