vendor:
GetSimpleCMS
by:
CodeSecLab
6.1
CVSS
HIGH
Remote Code Execution (RCE)
94
CWE
Product Name: GetSimpleCMS
Affected Version From: 3.3.16
Affected Version To: 3.3.16
Patch Exists: YES
Related CWE: CVE-2021-28976
CPE: a:getsimplecms:getsimplecms:3.3.16
Platforms Tested: Ubuntu, Windows
2024
GetSimpleCMS 3.3.16 – Remote Code Execution (RCE)
An attacker can exploit GetSimpleCMS version 3.3.16 by creating a malicious .phar file that contains a PHP script allowing the execution of arbitrary commands. By uploading this file through a vulnerable upload functionality, the attacker can trigger the execution of the injected code remotely, leading to a remote code execution vulnerability. This vulnerability is identified as CVE-2021-28976.
Mitigation:
To mitigate this vulnerability, it is recommended to update GetSimpleCMS to a patched version that includes specific filtering for 'phar' file types in the blacklists used for validation mechanisms.