In Fiyo CMS 2.x through 2.0.7, attackers may upload a webshell via the content parameter to "/dapur/apps/app_theme/libs/save_file.php" and then execute code.
References
Link | Resource |
---|---|
https://github.com/Xyntax/POC-T/blob/2.0/script/fiyo2.0.7-getshell.py | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/97571 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-04-10 10:59
Updated : 2017-04-17 11:17
NVD link : CVE-2017-7625
Mitre link : CVE-2017-7625
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
fiyo
- fiyo_cms