FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter or the preview/ data parameter. This can lead to Pre-Auth Remote Code Execution.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
https://github.com/daylightstudio/FUEL-CMS/issues/478 | patch third party advisory issue tracking |
https://0xd0ff9.wordpress.com/2019/07/19/from-code-evaluation-to-pre-auth-remote-code-execution-cve-2018-16763-bypass/ | third party advisory exploit |
https://www.exploit-db.com/exploits/47138 | third party advisory vdb entry exploit |
http://packetstormsecurity.com/files/153696/fuelCMS-1.4.1-Remote-Code-Execution.html | third party advisory vdb entry exploit |
http://packetstormsecurity.com/files/160080/Fuel-CMS-1.4-Remote-Code-Execution.html | third party advisory vdb entry exploit |
http://packetstormsecurity.com/files/164756/Fuel-CMS-1.4.1-Remote-Code-Execution.html | third party advisory vdb entry exploit |