Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-33085: ESPCMS-P8/Arbitrary code execution vulnerability exists in ESPCMS management system.md at 66fcc7f0fcc4d2325c0e31c9668f4c3362f0c06f · JeakinsCheung/ESPCMS-P8

ESPCMS P8 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the fetch_filename function at \espcms_public\espcms_templates\ESPCMS_Templates.

CVE
#vulnerability#php#rce#auth

Arbitrary code execution vulnerability exists in ESPCMS management system

Vulnerability description:

The vulnerability modifies the content of the homepage template file in the background, and after modification, a PHP suffix file with the same content will be generated. When the frontend accesses the homepage file, local code execution will be triggered.

Supplier: https://www.ecisp.cn/

Vulnerability file:

espcms\espcms_public\espcms_templates\ESPCMS_Templates.php

Code Analysis:

The code execution function eval is called in line 165. The content obtained by the $out variable is the content of the template file. The $fetch_filename parameter in line 84 is actually the address of the template file. In line 90, it is simply obtained with the file_get_contents() function. The contents of the template file are then assigned to $out.

espcms\espcms_public\espcms_templates\ESPCMS_Templates.php

This function is a function to modify the content of the template file. There are user-controllable input parameters in line 174, and the content is written to the template file in line 211.

espcms\espcms_admin\control\TemplateFile.php

Steps to reproduce:

\1. Log in to the background management page as an administrator

\2. Click Template Management -> Modify and change the content to

\3. After the modification is successful, save it, and access the home page to cause the code to execute.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907