Описание
PopojiCMS 2.0.1 contains an authenticated remote command execution vulnerability that allows administrative users to inject malicious PHP code through the metadata settings endpoint. Attackers can log in and modify the meta content to create a web shell that executes arbitrary system commands through a GET parameter.
PopojiCMS 2.0.1 contains an authenticated remote command execution vulnerability that allows administrative users to inject malicious PHP code through the metadata settings endpoint. Attackers can log in and modify the meta content to create a web shell that executes arbitrary system commands through a GET parameter.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-58284
- https://github.com/PopojiCMS/PopojiCMS
- https://github.com/PopojiCMS/PopojiCMS/archive/refs/tags/v2.0.1.zip
- https://www.exploit-db.com/exploits/52022
- https://www.popojicms.org
- https://www.vulncheck.com/advisories/popojicms-remote-command-execution-via-authenticated-metadata-settings
Связанные уязвимости
PopojiCMS 2.0.1 contains an authenticated remote command execution vulnerability that allows administrative users to inject malicious PHP code through the metadata settings endpoint. Attackers can log in and modify the meta content to create a web shell that executes arbitrary system commands through a GET parameter.