CVE-2021-46367

RiteCMS version 3.1.0 and below suffers from a remote code execution vulnerability in the admin panel. An authenticated attacker can upload a PHP file and bypass the .htacess configuration to deny execution of .php files in media and files directory by default.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ritecms:ritecms:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:33

Type Values Removed Values Added
References () https://gist.github.com/faisalfs10x/bd12e9abefb0d44f020bf297a14a4597 - Third Party Advisory () https://gist.github.com/faisalfs10x/bd12e9abefb0d44f020bf297a14a4597 - Third Party Advisory
References () https://packetstormsecurity.com/files/165430/RiteCMS-3.1.0-Shell-Upload-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () https://packetstormsecurity.com/files/165430/RiteCMS-3.1.0-Shell-Upload-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://ritecms.com/ - Product () https://ritecms.com/ - Product
References () https://www.exploit-db.com/exploits/50616 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/50616 - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2022-04-08 12:15

Updated : 2024-11-21 06:33


NVD link : CVE-2021-46367

Mitre link : CVE-2021-46367

CVE.ORG link : CVE-2021-46367


JSON object : View

Products Affected

ritecms

  • ritecms
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type