In OkayCMS through 2.3.4, an unauthenticated attacker can achieve remote code execution by injecting a malicious PHP object via a crafted cookie. This could happen at two places: first in view/ProductsView.php using the cookie price_filter, and second in api/Comparison.php via the cookie comparison.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/155583/OkayCMS-2.3.4-Remote-Code-Execution.html | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2019/Dec/15 | Exploit Third Party Advisory |
https://www.ait.ac.at/ait-sa-20191129-01-unauthenticated-remote-code-execution-okaycms | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-12-03T19:50:21
Updated: 2019-12-07T01:06:01
Reserved: 2019-09-25T00:00:00
Link: CVE-2019-16885
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-12-03T20:15:11.077
Modified: 2020-08-24T17:37:01.140
Link: CVE-2019-16885
JSON object: View
Redhat Information
No data.
CWE