Sruu.pl in Batflat 1.3.6 allows an authenticated user to perform code injection (and consequently Remote Code Execution) via the input fields of the Users tab. To exploit this, one must login to the administration panel and edit an arbitrary user's data (username, displayed name, etc.). NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/161457/Batflat-CMS-1.3.6-Remote-Code-Execution.html | Exploit Third Party Advisory |
https://batflat.org/en/changelog | Release Notes Vendor Advisory |
https://github.com/sruupl/batflat/issues/98 | Exploit Third Party Advisory |
https://secator.pl/index.php/2021/02/15/batflat-v-1-3-6-authenticated-remote-code-execution-public-disclosure/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-02-15T20:49:31
Updated: 2024-06-26T20:16:06.832Z
Reserved: 2020-12-27T00:00:00
Link: CVE-2020-35734
JSON object: View
NVD Information
Status : Modified
Published: 2021-02-15T21:15:13.263
Modified: 2024-06-26T21:15:11.440
Link: CVE-2020-35734
JSON object: View
Redhat Information
No data.
CWE