vendor:
TextPattern CMS
by:
Mert Das
9.8
CVSS
CRITICAL
Remote Command Execution (RCE)
78
CWE
Product Name: TextPattern CMS
Affected Version From: 4.8.2007
Affected Version To: 4.8.2007
Patch Exists: NO
Related CWE:
CPE: a:textpattern:textpattern:4.8.7
Platforms Tested: Server: Xampp
2021
TextPattern CMS 4.8.7 – Remote Command Execution (RCE) (Authenticated)
First of all, an attacker should use the file upload section to upload a malicious shell containing the code <?PHP system($_GET['cmd']);?>. Then, the attacker should go to the content section, click Files and upload the malicious php file. Finally, the attacker should go to the URL of the malicious file with the command as a parameter (e.g. yourserver/textpattern/files/yourphp.php?cmd=yourcode;). After the malicious file is uploaded, the attacker can execute arbitrary commands on the server.
Mitigation:
To mitigate this vulnerability, users should ensure that the file upload section is not accessible to unauthorized users and that the uploaded files are scanned for malicious code.