Sdcms

Sdcms

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.48%
  • Veröffentlicht 08.11.2024 21:15:20
  • Zuletzt bearbeitet 18.11.2024 14:35:04

The theme.php file in SDCMS 2.8 has a command execution vulnerability that allows for the execution of system commands

Exploit
  • EPSS 1.2%
  • Veröffentlicht 11.03.2019 01:29:00
  • Zuletzt bearbeitet 21.11.2024 04:52:03

An issue was discovered in SDCMS V1.7. In the \app\admin\controller\themecontroller.php file, the check_bad() function's filtering is not strict, resulting in PHP code execution. This occurs because some dangerous PHP functions (such as "eval") are b...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 11.03.2019 01:29:00
  • Zuletzt bearbeitet 21.11.2024 04:52:03

There is a CSRF in SDCMS V1.7 via an m=admin&c=theme&a=edit request. It allows PHP code injection by providing a filename in the file parameter, and providing file content in the t2 parameter.

Exploit
  • EPSS 1.03%
  • Veröffentlicht 29.11.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:58:27

app/plug/attachment/controller/admincontroller.php in SDCMS 1.6 allows reading arbitrary files via a /?m=plug&c=admin&a=index&p=attachment&root= directory traversal. The value of the root parameter must be base64 encoded (note that base64 encoding, i...

Exploit
  • EPSS 1.02%
  • Veröffentlicht 25.11.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:58:05

An issue was discovered in SDCMS 1.6 with PHP 5.x. app/admin/controller/themecontroller.php uses a check_bad function in an attempt to block certain PHP functions such as eval, but does not prevent use of preg_replace 'e' calls, allowing users to exe...

Exploit
  • EPSS 0.22%
  • Veröffentlicht 12.05.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:28

An issue was discovered in SDcms v1.5. Cross-site request forgery (CSRF) vulnerability in /WWW//app/admin/controller/admincontroller.php allows remote attackers to add administrator accounts via m=admin&c=admin&a=add.