ExpressionEngine before 5.4.2 and 6.x before 6.0.3 allows PHP Code Injection by certain authenticated users who can leverage Translate::save() to write to an _lang.php file under the system/user/language directory.
References
Link | Resource |
---|---|
http://karmainsecurity.com/KIS-2021-03 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/161805/ExpressionEngine-6.0.2-PHP-Code-Injection.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2021/Mar/32 | Mailing List Third Party Advisory |
https://expressionengine.com/features | Vendor Advisory |
https://hackerone.com/reports/1093444 | Permissions Required Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-03-15T22:52:42
Updated: 2021-03-15T23:06:43
Reserved: 2021-02-16T00:00:00
Link: CVE-2021-27230
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-03-15T23:15:12.703
Modified: 2022-07-12T17:42:04.277
Link: CVE-2021-27230
JSON object: View
Redhat Information
No data.
CWE