In OkayCMS through 2.3.4, an unauthenticated attacker can achieve remote code execution by injecting a malicious PHP object via a crafted cookie. This could happen at two places: first in view/ProductsView.php using the cookie price_filter, and second in api/Comparison.php via the cookie comparison.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/155583/OkayCMS-2.3.4-Remote-Code-Execution.html | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2019/Dec/15 | Exploit Third Party Advisory |
https://www.ait.ac.at/ait-sa-20191129-01-unauthenticated-remote-code-execution-okaycms | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-12-03 20:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-16885
Mitre link : CVE-2019-16885
CVE.ORG link : CVE-2019-16885
JSON object : View
Products Affected
okay-cms
- okaycms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')