GXCMS V1.5 has a file upload vulnerability in the background. The vulnerability is the template management page. You can edit any template content and then rename to PHP suffix file, after calling PHP file can control the server.
References
Link | Resource |
---|---|
https://github.com/ZackSecurity/VulnerReport/blob/cve/gxcms/1.md | |
https://github.com/breezety/gxcms15/issues/1 | Exploit Issue Tracking Third Party Advisory |
https://github.com/ZackSecurity/VulnerReport/blob/cve/gxcms/1.md | |
https://github.com/breezety/gxcms15/issues/1 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 07:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ZackSecurity/VulnerReport/blob/cve/gxcms/1.md - | |
References | () https://github.com/breezety/gxcms15/issues/1 - Exploit, Issue Tracking, Third Party Advisory |
23 Apr 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-05-17 16:15
Updated : 2024-11-21 07:02
NVD link : CVE-2022-30007
Mitre link : CVE-2022-30007
CVE.ORG link : CVE-2022-30007
JSON object : View
Products Affected
gxcms_project
- gxcms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type