vendor:
zzzphp
by:
Yang Chenglong
7.2
CVSS
HIGH
Dynamic Code Evaluation
78
CWE
Product Name: zzzphp
Affected Version From: 1.6.1
Affected Version To: 1.6.1
Patch Exists: YES
Related CWE: CVE-2019-9041
CPE: a:zzzcms:zzzphp:1.6.1
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows/Linux,iis/apache
2019
dynamic code evaluation of zzzphp cms 1.6.1
Due to the failure of filtering function parserIfLabel() in inc/zzz_template.php, attackers can insert dynamic php code into the template file and leads to dynamic code evaluation. Login in to the admin panel, edit the template of search.html, insert the following code: {if:assert($_POST[x])}phpinfo();{end if} Visit the http://webroot/search/ and post data “x = phpinfo();”, the page will execute the php code “phpinfo()” as follow.
Mitigation:
Filter user input and validate the data before using it in the application.