Articles for tag "Code Execution": 28

pfsense 2.3.2: Code Execution
2017 Mar 24

pfsense 2.3.2: Code Execution

pfsense is an open source firewall. The web interface is written in PHP. In version 2.3.2-RELEASE (amd64), the setup wizard is vulnerable to code execution. It should be noted that by default, only an administrator can access the setup wizard. By default, administrators have far-reaching permissions via the wizard and via other functionality. There are however some custom configurations where this vulnerability could lead to privilege escalation or undesired code execution.

HumHub 0.20.1 / 1.0.0-beta.3: Code Execution
2017 Mar 17

HumHub 0.20.1 / 1.0.0-beta.3: Code Execution

HumHub is a social media platform written in PHP. In version 0.20.1 as well as 1.0.0-beta.3, it is vulnerable to Code Execution as some functionality allows the uploading of PHP files. Successfull exploitation requires specific server settings. A user account is required as well, but registration is open by default.

Elefant CMS 1.3.12-RC: Code Execution
2017 Feb 02

Elefant CMS 1.3.12-RC: Code Execution

Elefant is a content managment system written in PHP. In version 1.3.12-RC, it is vulnerable to code execution because of two different vulnerabilities. It allows the upload of files with dangerous type, as well as PHP code injection. To exploit this a editor or admin account is required.

Lepton 2.2.2: Code Execution
2016 Nov 10

Lepton 2.2.2: Code Execution

Lepton is a content management system written in PHP. In version 2.2.2, it is vulnerable to code execution as it is possible to upload files with dangerous type via the media manager.

Jaws 1.1.1: Code Execution
2016 Nov 10

Jaws 1.1.1: Code Execution

Jaws is a content management system written in PHP. In version 1.1.1, it is vulnerable to code execution as it allows the upload of files with a dangerous type. An account with extended privileges is required.

PivotX 2.3.11: Code Execution
2016 Mar 15

PivotX 2.3.11: Code Execution

PivotX is vulnerable to code execution by authenticated users as it does not check the extension of files when renaming them.

Bigace 3.0: Code Execution
2016 Jan 28

Bigace 3.0: Code Execution

Bigace 3.0 allows the uploading of media file, but there is no verification, allowing the upload of PHP files by editors and administrators.

Wolf CMS v0.8.3.1: Code Execution & Privilege Escalation
2016 Jan 28

Wolf CMS v0.8.3.1: Code Execution & Privilege Escalation

There is a code execution vulnerability in Wolf CMS v0.8.3.1. A user account with the Editor role is required.

Xoops 2.5.7.1: Code Execution
2016 Jan 28

Xoops 2.5.7.1: Code Execution

There is a code execution vulnerability in Xoops 2.5.7.1. An admin account is required to exploit this issue, but the request is not protected against CSRF.

Grawlix 1.0.3: Code Execution
2015 Dec 21

Grawlix 1.0.3: Code Execution

Grawlix 1.0.3 does not check the file type or extension when an admin uploads an icon, leading to code execution.

CouchCMS 1.4.5: Code Execution
2015 Dec 21

CouchCMS 1.4.5: Code Execution

The file extension whitelist of CouchCMS 1.4.5 misses pht, which may lead to code execution under certain circumstances.

4images 1.7.11: Code Execution
2015 Dec 02

4images 1.7.11: Code Execution

There is a code execution vulnerability in the admin area of 4images 1.7.11.

phpwcms 1.7.9: Code Execution
2015 Dec 02

phpwcms 1.7.9: Code Execution

There are two Code Execution vulnerabilities in phpwcms 1.7.9. A registered user is required to exploit these issues.

Geeklog 2.1.0: Code Execution
2015 Dec 02

Geeklog 2.1.0: Code Execution

There are two code execution vulnerability in the admin area of Geeklog 2.1.0.

redaxscript 2.5.0: Code Execution
2015 Dec 02

redaxscript 2.5.0: Code Execution

There is a Code Execution vulnerability in the admin area of redaxscript 2.5.0.

appRain 4.0.3: Code Execution
2015 Dec 02

appRain 4.0.3: Code Execution

appRain 4.0.3, Code Execution, vulnerability, advisory

ClipperCMS 1.3.0: Code Execution
2015 Nov 13

ClipperCMS 1.3.0: Code Execution

There is a Code Execution vulnerability in ClipperCMS 1.3.0

dotclear 2.8.1: Code Execution
2015 Nov 13

dotclear 2.8.1: Code Execution

There is a Code Execution vulnerability in dotclear 2.8.1.

 TomatoCart v1.1.8.6.1: Code Execution
2015 Nov 13

TomatoCart v1.1.8.6.1: Code Execution

There are two Code Execution vulnerabilities in TomatoCart v1.1.8.6.1.

XCart 5.2.6: Code Execution
2015 Nov 04

XCart 5.2.6: Code Execution

There is a Code Execution vulnerability in the admin area of XCart 5.2.6.

TheHostingTool 1.2.6: Code Execution
2015 Oct 07

TheHostingTool 1.2.6: Code Execution

There is a Code Execution vulnerability in the admin area of TheHostingTool 1.2.6.

CubeCart 6.0.7: Code Execution
2015 Oct 07

CubeCart 6.0.7: Code Execution

There is a Code Execution vulnerability in the admin area of CubeCart 6.0.7.

Pligg CMS 2.0.2: Code Execution and CSRF
2015 Oct 07

Pligg CMS 2.0.2: Code Execution and CSRF

There is a Code Execution vulnerability in the admin area of Pligg CMS 2.0.2. It can be exploited via CSRF. This issue has not been fixed.

ZeusCart 4.0: Code Execution
2015 Sep 14

ZeusCart 4.0: Code Execution

There is an arbitrary file upload vulnerability in the admin area of ZeusCart 4.0. This issue has not been fixed.

Zen Cart 1.5.4: Code Execution and Information Leak
2015 Sep 14

Zen Cart 1.5.4: Code Execution and Information Leak

There is an arbitrary file upload vulnerability in the admin area of Zen Cart 1.5.4 as well as an information leak. This issue has only been partially fixed.

Serendipity 2.0.1: Code Execution
2015 Sep 01

Serendipity 2.0.1: Code Execution

There is a code execution vulnerability in Serendipity 2.0.1. It requires a registered user to exploit.

NibbleBlog 4.0.3: Code Execution
2015 Sep 01

NibbleBlog 4.0.3: Code Execution

There is a Code Execution vulnerability in the admin area of NibbleBlog 4.0.3. The issue is not yet fixed.

Bolt 2.2.4: Code Execution
2015 Aug 17

Bolt 2.2.4: Code Execution

The file editor of the admin area of Bolt 2.2.4 allows for the editing of file extensions, which leads to code execution once an attacker has gained admin credentials.