SeaCMS v6.61 allows Remote Code execution by placing PHP code in an allowed IP address (aka ip) to /admin/admin_ip.php (aka /adm1n/admin_ip.php). The code is executed by visiting adm1n/admin_ip.php or data/admin/ip.php. This can also be exploited through CSRF.
References
Link | Resource |
---|---|
https://github.com/MichaelWayneLIU/seacms/blob/master/seacms2.md | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-08-03T19:00:00
Updated: 2018-08-03T18:57:01
Reserved: 2018-08-03T00:00:00
Link: CVE-2018-14910
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-08-03T19:29:00.433
Modified: 2018-10-02T15:54:36.423
Link: CVE-2018-14910
JSON object: View
Redhat Information
No data.