ExpressionEngine before 5.4.2 and 6.x before 6.0.3 allows PHP Code Injection by certain authenticated users who can leverage Translate::save() to write to an _lang.php file under the system/user/language directory.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://hackerone.com/reports/1093444 | third party advisory permissions required |
https://expressionengine.com/features | vendor advisory |
http://seclists.org/fulldisclosure/2021/Mar/32 | third party advisory mailing list |
http://karmainsecurity.com/KIS-2021-03 | third party advisory exploit |
http://packetstormsecurity.com/files/161805/ExpressionEngine-6.0.2-PHP-Code-Injection.html | exploit vdb entry third party advisory |