Pluck CMS is vulnerable to an authenticated remote code execution (RCE) vulnerability through its “albums” module. Albums are used to create collections of images that can be inserted into web pages across the site. Albums allow the upload of various filetypes, which undergo a normalization process before being available on the site. Due to lack of file extension validation, it is possible to upload a crafted JPEG payload containing an embedded PHP web-shell. An attacker may navigate to it directly to achieve RCE on the underlying web server. Administrator credentials for the Pluck CMS web interface are required to access the albums module feature, and are thus required to exploit this vulnerability. CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C (8.2 High)
References
Link | Resource |
---|---|
https://www.synopsys.com/blogs/software-security/pluck-cms-vulnerability/ | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: SNPS
Published: 2023-03-27T16:35:22.406Z
Updated: 2023-03-27T16:35:22.406Z
Reserved: 2023-02-15T17:57:02.192Z
Link: CVE-2023-25828
JSON object: View
NVD Information
Status : Modified
Published: 2023-03-27T17:15:09.480
Modified: 2023-11-07T04:09:13.863
Link: CVE-2023-25828
JSON object: View
Redhat Information
No data.
CWE