PHPCMS 2008 Remote Code Execution Vulnerability
漏洞信息
漏洞名称: PHPCMS 2008 Remote Code Execution Vulnerability
漏洞编号:
- CVE: CVE-2018-19127
漏洞类型: 代码注入
漏洞等级: 严重
漏洞描述: PHPCMS 2008是一款流行的内容管理系统,广泛应用于网站建设和管理。该系统因其易用性和灵活性而受到许多开发者和企业的青睐。然而,PHPCMS 2008中存在一个严重的代码注入漏洞,攻击者可以通过控制’template’参数,将恶意PHP代码写入缓存文件中,从而实现远程代码执行。这一漏洞的技术根源在于对用户输入的’template’参数缺乏充分的验证和过滤,导致攻击者能够注入并执行任意代码。由于该漏洞允许攻击者在服务器上执行任意命令,因此其潜在的安全风险极高,可能导致服务器被完全控制、数据泄露或服务中断。值得注意的是,利用此漏洞不需要任何形式的认证,且可以自动化执行,这使得它成为攻击者的理想目标。
产品厂商: PHPCMS
产品名称: PHPCMS 2008
来源: https://github.com/projectdiscovery/nuclei-templates/issues/12722
类型: projectdiscovery/nuclei-templates:github issues
来源概述
Description:
PHPCMS 2008 contains a code injection caused by writing PHP code from the ‘template’ parameter to cache files in /type.php, letting attackers execute arbitrary code, exploit requires control over ‘template’ parameter.
Severity: Critical
POC:
KEV: True
Shodan Query: NA
Acceptance Criteria: The template must include a complete POC and should not rely solely on version-based detection. Contributors are required to provide debug data(
-debug
) along with the template to help the triage team with validation or can also share a vulnerable environment like docker file.
Rewards will only be given once the template is fully validated by the team. Templates that are incomplete or invalid will not be accepted. Avoid adding code templates for CVEs that can be achieved using HTTP, TCP, or JavaScript. Such templates are blocked by default and won’t produce results, so we prioritize creating templates with other protocols unless exceptions are made.
You can check the FAQ for the Nuclei Templates Community Rewards Program here.