AeroCMS v0.0.1 was discovered to contain an arbitrary file upload vulnerability via the Post Image function under the Admin panel. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/166659/AeroCMS-0.0.1-Shell-Upload.html | Exploit Third Party Advisory VDB Entry |
https://drive.google.com/file/d/1PdF7gTUt_QuU2ObS9YUVew6orHaho-QF/view?usp=sharing | Exploit Third Party Advisory |
https://github.com/D4rkP0w4r/AeroCMS-Unrestricted-File-Upload-POC | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-04-08T08:23:33
Updated: 2022-04-08T17:06:20
Reserved: 2022-03-14T00:00:00
Link: CVE-2022-27061
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-04-08T09:15:11.493
Modified: 2022-04-13T20:53:56.857
Link: CVE-2022-27061
JSON object: View
Redhat Information
No data.
CWE