vendor:
TextPattern CMS
by:
Mevlüt Akçam
9,8
CVSS
HIGH
Remote Command Execution (RCE)
78
CWE
Product Name: TextPattern CMS
Affected Version From: 4.9.0-dev
Affected Version To: 4.9.0-dev
Patch Exists: YES
Related CWE: N/A
CPE: a:textpattern:textpattern:4.9.0-dev
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu 20.04.1
2021
TextPattern CMS 4.9.0-dev – Remote Command Execution (RCE) (Authenticated)
This exploit allows an authenticated user to execute arbitrary commands on the vulnerable TextPattern CMS 4.9.0-dev system. The exploit requires the user to have valid credentials to the system. The exploit uses the ‘theplugin’ parameter to upload a malicious PHP file which contains a form with a text field. The form is used to execute arbitrary commands on the system. The exploit was tested on Ubuntu 20.04.1.
Mitigation:
The user should ensure that the system is updated to the latest version of TextPattern CMS. The user should also ensure that the system is patched with the latest security updates.