Vulnerability CVE-2015-6567


Published: 2017-04-14

Description:
Wolf CMS before 0.8.3.1 allows unrestricted file upload and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not validate the parameter "filename" properly. Exploitation requires a registered user who has access to upload functionality.

See advisories in our WLB2 database:
Topic
Author
Date
High
Wolf CMS 0.8.2 Arbitrary PHP File Upload
Rahmat Nurfauzi
23.06.2016

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Wolfcms -> Wolf cms 

 References:
http://www.websecgeeks.com/2015/08/wolf-cms-arbitrary-file-upload-to.html
https://github.com/wolfcms/wolfcms/commit/2160275b60736f706dfda132c7c46728c5b255fa
https://github.com/wolfcms/wolfcms/issues/625
https://github.com/wolfcms/wolfcms/releases/tag/0.8.3.1
https://www.exploit-db.com/exploits/38000/
https://www.exploit-db.com/exploits/40004/
https://www.wolfcms.org/blog/2015/08/10/releasing-wolf-cms-0-8-3-1.html

Copyright 2024, cxsecurity.com

 

Back to Top