RiteCMS version 3.1.0 and below suffers from a remote code execution vulnerability in the admin panel. An authenticated attacker can upload a PHP file and bypass the .htacess configuration to deny execution of .php files in media and files directory by default.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://gist.github.com/faisalfs10x/bd12e9abefb0d44f020bf297a14a4597 | third party advisory |
https://ritecms.com/ | product |
https://www.exploit-db.com/exploits/50616 | exploit vdb entry third party advisory |
https://packetstormsecurity.com/files/165430/RiteCMS-3.1.0-Shell-Upload-Remote-Code-Execution.html | exploit vdb entry third party advisory |