vendor:
Lepton CMS
by:
John Page (HYP3RLINX)
8,8
CVSS
HIGH
PHP Code Injection
78
CWE
Product Name: Lepton CMS
Affected Version From: 2.2.0
Affected Version To: 2.2.1
Patch Exists: YES
Related CWE: N/A
CPE: a:lepton-cms:lepton_cms
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2020
Lepton CMS PHP Code Injection
Lepton CMS versions 2.2.0 and 2.2.1 are vulnerable to PHP Code Injection. The vulnerability exists due to insufficient input validation on the "Database User" input field when entering Lepton CMS setup information using the Install Wizard. A malicious user can input malicious code in the "Database User" field, which is then written to the "config.php" file. This can allow for PHP Remote Command Execution on the Host system. An attacker can make an HTTP GET request to "http://victim-server/upload/install/save.php" to execute the malicious code, or request "http://victim-server/config.php" to view the injected code.
Mitigation:
Upgrade to Lepton CMS version 2.2.1 or later.