A vulnerability, which was classified as problematic, has been found in westboy CicadasCMS 1.0. This issue affects some unknown processing of the file /system of the component Template Management. The manipulation leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://vuldb.com/?id.296507 | vdb entry |
https://vuldb.com/?ctiid.296507 | permissions required signature |
https://vuldb.com/?submit.499520 | third party advisory |
https://github.com/FightingLzn9/vul/blob/main/CicadasCMS(2).md | exploit |