CMSimple_XH 1.7.4 is affected by a remote code execution (RCE) vulnerability. To exploit this vulnerability, an attacker must use the "File" parameter to upload a PHP payload to get a reverse shell from the vulnerable host.
References
Link | Resource |
---|---|
https://github.com/Net-hunter121/CMSimple_XH-Unauth-RCE | Exploit Third Party Advisory |
https://github.com/cmsimple-xh/cmsimple-xh/releases/tag/1.7.5 | Release Notes Third Party Advisory |
https://github.com/Net-hunter121/CMSimple_XH-Unauth-RCE | Exploit Third Party Advisory |
https://github.com/cmsimple-xh/cmsimple-xh/releases/tag/1.7.5 | Release Notes Third Party Advisory |
Configurations
History
21 Nov 2024, 06:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Net-hunter121/CMSimple_XH-Unauth-RCE - Exploit, Third Party Advisory | |
References | () https://github.com/cmsimple-xh/cmsimple-xh/releases/tag/1.7.5 - Release Notes, Third Party Advisory |
16 May 2022, 17:04
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-434 | |
References | (MISC) https://github.com/Net-hunter121/CMSimple_XH-Unauth-RCE - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/cmsimple-xh/cmsimple-xh/releases/tag/1.7.5 - Release Notes, Third Party Advisory | |
CPE | cpe:2.3:a:cmsimple-xh:cmsimple_xh:1.7.4:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 10.0 |
10 May 2022, 12:21
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-05-10 12:15
Updated : 2024-11-21 06:27
NVD link : CVE-2021-42645
Mitre link : CVE-2021-42645
CVE.ORG link : CVE-2021-42645
JSON object : View
Products Affected
cmsimple-xh
- cmsimple_xh
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type