[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

CMSimple 5.15 - Remote Code Execution (Authenticated) Vulnerability

Author
Ahmet Ümit BAYRAM
Risk
[
Security Risk Critical
]
0day-ID
0day-ID-39645
Category
web applications
Date add
04-06-2024
Platform
php
# Exploit Title: CMSimple 5.15 - Remote Command Execution
# Exploit Author: Ahmet Ümit BAYRAM
# Vendor Homepage: https://www.cmsimple.org
# Software Link: https://www.cmsimple.org/downloads_cmsimple50/CMSimple_5-15.zip
# Version: latest
# Tested on: MacOS

# Log in to SimpleCMS.
# Go to Settings > CMS
# Append ",php" to the end of the Extensions_userfiles field and save it.
# Navigate to Files > Media
# Select and upload shell.php
# Your shell is ready: https://{url}/userfiles/media/shell.php

#  0day.today [2024-06-28]  #