Sruu.pl in Batflat 1.3.6 allows an authenticated user to perform code injection (and consequently Remote Code Execution) via the input fields of the Users tab. To exploit this, one must login to the administration panel and edit an arbitrary user's data (username, displayed name, etc.). NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/161457/Batflat-CMS-1.3.6-Remote-Code-Execution.html | Exploit Third Party Advisory |
https://batflat.org/en/changelog | Release Notes Vendor Advisory |
https://github.com/sruupl/batflat/issues/98 | Exploit Third Party Advisory |
https://secator.pl/index.php/2021/02/15/batflat-v-1-3-6-authenticated-remote-code-execution-public-disclosure/ | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/161457/Batflat-CMS-1.3.6-Remote-Code-Execution.html | Exploit Third Party Advisory |
https://batflat.org/en/changelog | Release Notes Vendor Advisory |
https://github.com/sruupl/batflat/issues/98 | Exploit Third Party Advisory |
https://secator.pl/index.php/2021/02/15/batflat-v-1-3-6-authenticated-remote-code-execution-public-disclosure/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/161457/Batflat-CMS-1.3.6-Remote-Code-Execution.html - Exploit, Third Party Advisory | |
References | () https://batflat.org/en/changelog - Release Notes, Vendor Advisory | |
References | () https://github.com/sruupl/batflat/issues/98 - Exploit, Third Party Advisory | |
References | () https://secator.pl/index.php/2021/02/15/batflat-v-1-3-6-authenticated-remote-code-execution-public-disclosure/ - Exploit, Third Party Advisory |
07 Nov 2023, 03:22
Type | Values Removed | Values Added |
---|---|---|
Summary | Sruu.pl in Batflat 1.3.6 allows an authenticated user to perform code injection (and consequently Remote Code Execution) via the input fields of the Users tab. To exploit this, one must login to the administration panel and edit an arbitrary user's data (username, displayed name, etc.). NOTE: This vulnerability only affects products that are no longer supported by the maintainer |
Information
Published : 2021-02-15 21:15
Updated : 2024-11-21 05:27
NVD link : CVE-2020-35734
Mitre link : CVE-2020-35734
CVE.ORG link : CVE-2020-35734
JSON object : View
Products Affected
batflat
- batflat
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')