In OkayCMS through 2.3.4, an unauthenticated attacker can achieve remote code execution by injecting a malicious PHP object via a crafted cookie. This could happen at two places: first in view/ProductsView.php using the cookie price_filter, and second in api/Comparison.php via the cookie comparison.
References
Link | Resource |
---|---|
https://www.ait.ac.at/ait-sa-20191129-01-unauthenticated-remote-code-execution-okaycms | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2019/Dec/15 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/155583/OkayCMS-2.3.4-Remote-Code-Execution.html | Exploit Third Party Advisory |
Configurations
Information
Published : 2019-12-03 12:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-16885
Mitre link : CVE-2019-16885
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
okay-cms
- okaycms