Remote Code Execution vulnerability in symphony/content/content.blueprintsdatasources.php in Symphony CMS through 2.6.11 allows remote attackers to execute code and get a webshell from the back-end. The attacker must be authenticated and enter PHP code in the datasource editor or event editor.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://github.com/symphonycms/symphony-2/commit/e30a18f8f09dca836e141bf126a26e565c9a2bc7 | patch |
https://github.com/symphonycms/symphony-2/issues/2655 | issue tracking patch |
http://www.securityfocus.com/bid/97594 | vdb entry third party advisory |
http://www.math1as.com/symphonycms_2.7_exec.txt | third party advisory exploit |