vendor:
PopojiCMS
by:
tmrswrr
6.1
CVSS
HIGH
Remote Command Execution
78
CWE
Product Name: PopojiCMS
Affected Version From: 2.0.1
Affected Version To: 2.0.1
Patch Exists: NO
Related CWE: CVE-2023-XXXX (Not provided in the text)
CPE: a:popojicms:popojicms:2.0.1
Platforms Tested: Linux
2023
PopojiCMS Version 2.0.1 Remote Command Execution
PopojiCMS version 2.0.1 is vulnerable to remote command execution. By injecting a malicious payload into the Meta Social section under settings, an attacker can execute arbitrary commands on the server. This can lead to unauthorized access and potential data breaches. The exploit allows an attacker to execute system commands, as demonstrated by the payload '<?php echo system('id'); ?>'.
Mitigation:
To mitigate this vulnerability, it is recommended to sanitize user inputs and validate data before processing it. Additionally, access controls should be implemented to prevent unauthorized users from accessing sensitive functionalities.