An arbitrary file upload issue exists in Mara CMS 7.5. In order to exploit this, an attacker must have a valid authenticated (admin/manager) session and make a codebase/dir.php?type=filenew request to upload PHP code to codebase/handler.php.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://sourceforge.net/projects/maracms/ | third party advisory product |
https://www.exploit-db.com/exploits/48780 | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/159304/MaraCMS-7.5-Remote-Code-Execution.html | exploit vdb entry third party advisory |