Dedecms

Dedecms

167 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.64%
  • Veröffentlicht 19.09.2018 15:29:19
  • Zuletzt bearbeitet 21.11.2024 03:53:20

XML injection vulnerability exists in the file of DedeCMS V5.7 SP2 version, which can be utilized by attackers to create script file to obtain webshell

Exploit
  • EPSS 0.56%
  • Veröffentlicht 08.06.2018 01:29:01
  • Zuletzt bearbeitet 21.11.2024 03:44:29

DedeCMS through V5.7SP2 allows arbitrary file upload in dede/file_manage_control.php via a dede/file_manage_view.php?fmdo=upload request with an upfile1 parameter, as demonstrated by uploading a .php file.

Exploit
  • EPSS 0.17%
  • Veröffentlicht 08.06.2018 01:29:01
  • Zuletzt bearbeitet 21.11.2024 03:44:29

DedeCMS through 5.7SP2 allows arbitrary file write in dede/file_manage_control.php via a dede/file_manage_view.php?fmdo=newfile request with name and str parameters, as demonstrated by writing to a new .php file.

  • EPSS 0.56%
  • Veröffentlicht 25.04.2018 09:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:17

A file uploading vulnerability exists in /include/helpers/upload.helper.php in DedeCMS V5.7 SP2, which can be utilized by attackers to upload and execute arbitrary PHP code via the /dede/archives_do.php?dopost=uploadLitpic litpic parameter when "Cont...

  • EPSS 1.11%
  • Veröffentlicht 02.04.2018 03:29:00
  • Zuletzt bearbeitet 21.11.2024 04:15:07

sys_verifies.php in DedeCMS 5.7 allows remote attackers to execute arbitrary PHP code via the refiles array parameter, because the contents of modifytmp.inc are under an attacker's control.

  • EPSS 2.11%
  • Veröffentlicht 02.04.2018 03:29:00
  • Zuletzt bearbeitet 21.11.2024 04:15:07

DedeCMS 5.7 allows remote attackers to execute arbitrary PHP code via the egroup parameter to uploads/dede/stepselect_main.php because code within the database is accessible to uploads/dede/sys_cache_up.php.

  • EPSS 0.3%
  • Veröffentlicht 30.03.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:15:02

file_manage_control.php in DedeCMS 5.7 has CSRF in an fmdo=rename action, as demonstrated by renaming an arbitrary file under uploads/userup to a .php file under the web root to achieve PHP code execution. This uses the oldfilename and newfilename pa...

Exploit
  • EPSS 93.35%
  • Veröffentlicht 27.03.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:33

DedeCMS 5.7 has CSRF with an impact of arbitrary code execution, because the partcode parameter in a tag_test_action.php request can specify a runphp field in conjunction with PHP code.

Exploit
  • EPSS 92.8%
  • Veröffentlicht 13.02.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:24

DedeCMS 5.7 allows remote attackers to discover the full path via a direct request for include/downmix.inc.php or inc/inc_archives_functions.php.

Exploit
  • EPSS 0.49%
  • Veröffentlicht 12.02.2018 03:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:21

EmpireCMS 6.6 allows remote attackers to discover the full path via an array value for a parameter to admin/tool/ShowPic.php.