ExpressionEngine before 5.4.2 and 6.x before 6.0.3 allows PHP Code Injection by certain authenticated users who can leverage Translate::save() to write to an _lang.php file under the system/user/language directory.
References
Link Resource
http://karmainsecurity.com/KIS-2021-03 Exploit Third Party Advisory
http://packetstormsecurity.com/files/161805/ExpressionEngine-6.0.2-PHP-Code-Injection.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2021/Mar/32 Mailing List Third Party Advisory
https://expressionengine.com/features Vendor Advisory
https://hackerone.com/reports/1093444 Permissions Required Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2021-03-15T22:52:42

Updated: 2021-03-15T23:06:43

Reserved: 2021-02-16T00:00:00


Link: CVE-2021-27230

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-03-15T23:15:12.703

Modified: 2022-07-12T17:42:04.277


Link: CVE-2021-27230

JSON object: View

cve-icon Redhat Information

No data.

CWE