CMSimple_XH 1.7.4 is affected by a remote code execution (RCE) vulnerability. To exploit this vulnerability, an attacker must use the "File" parameter to upload a PHP payload to get a reverse shell from the vulnerable host.
References
Link | Resource |
---|---|
https://github.com/Net-hunter121/CMSimple_XH-Unauth-RCE | Exploit Third Party Advisory |
https://github.com/cmsimple-xh/cmsimple-xh/releases/tag/1.7.5 | Release Notes Third Party Advisory |
https://github.com/Net-hunter121/CMSimple_XH-Unauth-RCE | Exploit Third Party Advisory |
https://github.com/cmsimple-xh/cmsimple-xh/releases/tag/1.7.5 | Release Notes Third Party Advisory |
Configurations
History
21 Nov 2024, 06:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Net-hunter121/CMSimple_XH-Unauth-RCE - Exploit, Third Party Advisory | |
References | () https://github.com/cmsimple-xh/cmsimple-xh/releases/tag/1.7.5 - Release Notes, Third Party Advisory |
Information
Published : 2022-05-10 12:15
Updated : 2024-11-21 06:27
NVD link : CVE-2021-42645
Mitre link : CVE-2021-42645
CVE.ORG link : CVE-2021-42645
JSON object : View
Products Affected
cmsimple-xh
- cmsimple_xh
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type