In baserCMS before 4.1.4, lib\Baser\Model\ThemeConfig.php allows remote attackers to execute arbitrary PHP code via the admin/theme_configs/form data[ThemeConfig][logo] parameter.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://github.com/baserproject/basercms/issues/959 | issue tracking third party advisory |
http://sunu11.com/2018/10/31/baserCMS/ | third party advisory exploit |
https://basercms.net/release/4_1_4 | release notes vendor advisory |