vendor:
SlimCMS
by:
StAkeR aka athos
7.5
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: SlimCMS
Affected Version From: 1.0.0
Affected Version To: 1.0.0
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
SlimCMS <= 1.0.0 Privilege Escalation Exploit
This exploit allows an attacker to gain administrator privileges on SlimCMS version 1.0.0 and below. The exploit works by sending a POST request to the redirect.php file with the newusername, newpassword, and newisadmin parameters set to the desired username and a value of 1 for newisadmin. If successful, the attacker will be able to log in with the specified username and password and have administrator privileges.
Mitigation:
Upgrade to the latest version of SlimCMS.