Description
Exponent CMS 2.6.0patch2 allows an authenticated admin user to upload a malicious extension in the format of a ZIP file with a PHP file inside it. After upload it, the PHP file will be placed at "themes/simpletheme/{rce}.php" from where can be accessed in order to execute commands.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-28158 | Exponent CMS 2.6.0patch2 allows an authenticated admin user to upload a malicious extension in the format of a ZIP file with a PHP file inside it. After upload it, the PHP file will be placed at "themes/simpletheme/{rce}.php" from where can be accessed in order to execute commands. |
References
History
No history.
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2024-08-03T03:28:43.253Z
Reserved: 2022-01-10T00:00:00.000Z
Link: CVE-2022-23048
No data.
Status : Modified
Published: 2022-02-09T23:15:19.570
Modified: 2024-11-21T06:47:52.973
Link: CVE-2022-23048
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD