An issue was discovered in SDCMS 1.6 with PHP 5.x. app/admin/controller/themecontroller.php uses a check_bad function in an attempt to block certain PHP functions such as eval, but does not prevent use of preg_replace 'e' calls, allowing users to execute arbitrary code by leveraging access to admin template management.
References
Link | Resource |
---|---|
https://blog.whiterabbitxyj.com/cve/SDCMS_1.6_code_execution.doc | Exploit Third Party Advisory |
https://github.com/WhiteRabbitc/WhiteRabbitc.github.io/blob/master/cve/SDCMS_1.6_code_execution.doc | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-11-25T20:00:00
Updated: 2018-11-25T20:57:01
Reserved: 2018-11-25T00:00:00
Link: CVE-2018-19520
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-11-25T20:29:00.337
Modified: 2019-02-04T14:50:27.690
Link: CVE-2018-19520
JSON object: View
Redhat Information
No data.
CWE