CVE-2021-27230

ExpressionEngine before 5.4.2 and 6.x before 6.0.3 allows PHP Code Injection by certain authenticated users who can leverage Translate::save() to write to an _lang.php file under the system/user/language directory.
References
Link Resource
http://karmainsecurity.com/KIS-2021-03 Exploit Third Party Advisory
http://packetstormsecurity.com/files/161805/ExpressionEngine-6.0.2-PHP-Code-Injection.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2021/Mar/32 Mailing List Third Party Advisory
https://expressionengine.com/features Vendor Advisory
https://hackerone.com/reports/1093444 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:expressionengine:expressionengine:*:*:*:*:*:*:*:*
cpe:2.3:a:expressionengine:expressionengine:*:*:*:*:*:*:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-20 CWE-94

Information

Published : 2021-03-15 23:15

Updated : 2024-02-04 21:23


NVD link : CVE-2021-27230

Mitre link : CVE-2021-27230

CVE.ORG link : CVE-2021-27230


JSON object : View

Products Affected

expressionengine

  • expressionengine
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')