Remote code execution vulnerability in /cmsms-2.1.6-install.php/index.php in CMS Made Simple version 2.1.6 allows remote attackers to inject arbitrary PHP code via the "timezone" parameter in step 4 of a fresh installation procedure.
References
Link | Resource |
---|---|
http://dev.cmsmadesimple.org/project/changelog/5471 | Release Notes |
https://packetstormsecurity.com/files/146568/CMS-Made-Simple-2.1.6-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/44192/ | Exploit Third Party Advisory VDB Entry |
http://dev.cmsmadesimple.org/project/changelog/5471 | Release Notes |
https://packetstormsecurity.com/files/146568/CMS-Made-Simple-2.1.6-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/44192/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://dev.cmsmadesimple.org/project/changelog/5471 - Release Notes | |
References | () https://packetstormsecurity.com/files/146568/CMS-Made-Simple-2.1.6-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/44192/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-02-26 17:29
Updated : 2024-11-21 04:12
NVD link : CVE-2018-7448
Mitre link : CVE-2018-7448
CVE.ORG link : CVE-2018-7448
JSON object : View
Products Affected
cmsmadesimple
- cms_made_simple
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')