An issue in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted payload to the Content Manager Menu component.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://github.com/sromanhu/CMSmadesimple-SSTI--Content | third party advisory exploit |
https://github.com/sromanhu/CVE-2023-43352-CMSmadesimple-SSTI--Content | third party advisory exploit |