vendor:
                    GetSimpleCMS
                by:
                    CodeSecLab
                6.1
                        CVSS
                    HIGH
                    Remote Code Execution (RCE)
                    94
                        CWE
                    Product Name: GetSimpleCMS
                    Affected Version From:  3.3.16
                    Affected Version To:  3.3.16
                    Patch Exists: YES
                    Related CWE: CVE-2021-28976
                    CPE:  a:getsimplecms:getsimplecms:3.3.16
                    Platforms Tested:  Ubuntu, Windows
                    2024
                    GetSimpleCMS 3.3.16 – Remote Code Execution (RCE)
An attacker can exploit GetSimpleCMS version 3.3.16 by creating a malicious .phar file that contains a PHP script allowing the execution of arbitrary commands. By uploading this file through a vulnerable upload functionality, the attacker can trigger the execution of the injected code remotely, leading to a remote code execution vulnerability. This vulnerability is identified as CVE-2021-28976.
Mitigation:
					To mitigate this vulnerability, it is recommended to update GetSimpleCMS to a patched version that includes specific filtering for 'phar' file types in the blacklists used for validation mechanisms.