Vulnerabilities (CVE)

Filtered by vendor Sdcms Subscribe
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-9652 1 Sdcms 1 Sdcms 2024-02-04 6.8 MEDIUM 8.8 HIGH
There is a CSRF in SDCMS V1.7 via an m=admin&c=theme&a=edit request. It allows PHP code injection by providing a filename in the file parameter, and providing file content in the t2 parameter.
CVE-2019-9651 1 Sdcms 1 Sdcms 2024-02-04 7.5 HIGH 9.8 CRITICAL
An issue was discovered in SDCMS V1.7. In the \app\admin\controller\themecontroller.php file, the check_bad() function's filtering is not strict, resulting in PHP code execution. This occurs because some dangerous PHP functions (such as "eval") are blocked but others (such as "system") are not, and because ".php" is blocked but ".PHP" is not blocked.
CVE-2018-19748 1 Sdcms 1 Sdcms 2024-02-04 5.0 MEDIUM 7.5 HIGH
app/plug/attachment/controller/admincontroller.php in SDCMS 1.6 allows reading arbitrary files via a /?m=plug&c=admin&a=index&p=attachment&root= directory traversal. The value of the root parameter must be base64 encoded (note that base64 encoding, instead of URL encoding, is very rare in a directory traversal attack vector).
CVE-2018-19520 2 Php, Sdcms 2 Php, Sdcms 2024-02-04 6.5 MEDIUM 8.8 HIGH
An issue was discovered in SDCMS 1.6 with PHP 5.x. app/admin/controller/themecontroller.php uses a check_bad function in an attempt to block certain PHP functions such as eval, but does not prevent use of preg_replace 'e' calls, allowing users to execute arbitrary code by leveraging access to admin template management.
CVE-2018-11004 1 Sdcms 1 Sdcms 2024-02-04 6.8 MEDIUM 8.8 HIGH
An issue was discovered in SDcms v1.5. Cross-site request forgery (CSRF) vulnerability in /WWW//app/admin/controller/admincontroller.php allows remote attackers to add administrator accounts via m=admin&c=admin&a=add.