Vulnerability CVE-2021-27230


Published: 2021-03-15   Modified: 2021-03-16

Description:
ExpressionEngine before 5.4.2 and 6.x before 6.0.3 allows PHP Code Injection by certain authenticated users who can leverage Translate::save() to write to an _lang.php file under the system/user/language directory.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
ExpressionEngine 6.0.2 PHP Code Injection
EgiX
17.03.2021

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Expressionengine -> Expressionengine 

 References:
http://karmainsecurity.com/KIS-2021-03
http://packetstormsecurity.com/files/161805/ExpressionEngine-6.0.2-PHP-Code-Injection.html
http://seclists.org/fulldisclosure/2021/Mar/32
https://expressionengine.com/features
https://hackerone.com/reports/1093444

Copyright 2024, cxsecurity.com

 

Back to Top