Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v2h5-46c5-j7mf

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The bashMail function in cms/data/skins/techjunkie/fragments/contacts/functions.php in SkyBlueCanvas CMS before 1.1 r248-04, when the pid parameter is 4, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) name, (2) email, (3) subject, or (4) message parameter to index.php.

The bashMail function in cms/data/skins/techjunkie/fragments/contacts/functions.php in SkyBlueCanvas CMS before 1.1 r248-04, when the pid parameter is 4, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) name, (2) email, (3) subject, or (4) message parameter to index.php.

EPSS

Процентиль: 99%
0.7853
Высокий

Дефекты

CWE-134

Связанные уязвимости

nvd
около 12 лет назад

The bashMail function in cms/data/skins/techjunkie/fragments/contacts/functions.php in SkyBlueCanvas CMS before 1.1 r248-04, when the pid parameter is 4, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) name, (2) email, (3) subject, or (4) message parameter to index.php.

EPSS

Процентиль: 99%
0.7853
Высокий

Дефекты

CWE-134