jpress 4.2.0 is vulnerable to remote code execution via io.jpress.web.admin._TemplateController#doInstall. The admin panel provides a function through which attackers can install templates and inject some malicious code.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
http://jpress.com | product |
https://github.com/JPressProjects/jpress | product |
https://github.com/JPressProjects/jpress/issues/168 | issue tracking exploit third party advisory |