vendor:
Schlix CMS
by:
Eren Saraç
8.8
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: Schlix CMS
Affected Version From: 2.2.6-6
Affected Version To: 2.2.6-6
Patch Exists: YES
Related CWE: N/A
CPE: a:schlix:schlix_cms
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows & WampServer
2021
Schlix CMS 2.2.6-6 – Remote Code Execution (Authenticated)
Schlix CMS 2.2.6-6 is vulnerable to Remote Code Execution. An authenticated user can exploit this vulnerability by creating a new category, downloading the 'mailchimp' extension from Github, editing the 'packageinfo.inc' file, pasting malicious PHP code, compressing the file to ZIP and renaming it 'combo_mailchimp-1_0_1', installing the package to the created category, entering the installed 'mailchimp' extension, clicking the 'About' tab and executing the malicious code.
Mitigation:
Update to the latest version of Schlix CMS.