Blue River Mura CMS before v7.0.7029 supports inline function calls with an [m] tag and [/m] end tag, without proper restrictions on file types or pathnames, which allows remote attackers to execute arbitrary code via an [m]$.dspinclude("../pathname/executable.jpeg")[/m] approach, where executable.jpeg contains ColdFusion Markup Language code. This can be exploited in conjunction with a CKFinder feature that allows file upload.
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2018-02-26T14:00:00

Updated: 2018-02-26T14:57:01

Reserved: 2018-02-26T00:00:00


Link: CVE-2018-7486

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-02-26T14:29:00.447

Modified: 2019-10-03T00:03:26.223


Link: CVE-2018-7486

JSON object: View

cve-icon Redhat Information

No data.

CWE