An unrestricted file upload issue in HorizontCMS 1.0.0-beta allows an authenticated remote attacker to upload PHP code through a zip file by uploading a theme, and executing the PHP file via an HTTP GET request to /themes/<php_file_name>
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://github.com/jkana/HorizontCMS-1.0.0-beta-shell-upload | third party advisory exploit |
https://github.com/ttimot24/HorizontCMS/issues/21 | third party advisory |