OS Command Injection in CosCms
Advisory ID: | HTB23145 |
Product: | CosCms |
Vendor: | CosCMS |
Vulnerable Versions: | 1.721 and probably prior |
Tested Version: | 1.721 |
Advisory Publication: | February 13, 2013 [without technical details] |
Vendor Notification: | February 13, 2013 |
Vendor Fix: | February 13, 2013 |
Public Disclosure: | March 6, 2013 |
Latest Update: | February 19, 2013 |
Vulnerability Type: | OS Command Injection [CWE-78] |
CVE Reference: | CVE-2013-1668 |
Risk Level: | High |
CVSSv2 Base Score: | 8.5 (AV:N/AC:M/Au:S/C:C/I:C/A:C) |
Solution Status: | Fixed by Vendor |
Discovered and Provided: | High-Tech Bridge Security Research Lab |
Advisory Details: | |
High-Tech Bridge Security Research Lab discovered vulnerability in CosCms, which can be exploited to execute arbitrary OS commands on web server where the vulnerable application is hosted. | |
Solution: | |
Upgrade to CosCms 1.822 More Information: http://www.coscms.org/blog/view/4/Version-1.822 https://github.com/diversen/gallery/blob/master/upload/index.php https://github.com/diversen/gallery/commit/7d58f870e8edc6597485dd1b80ea9fb78580190c | |
References: | |
[1] High-Tech Bridge Advisory HTB23145 - https://www.immuniweb.com/advisory/HTB23145 - OS Command Injection in CosCms. [2] CosCms - http://www.coscms.org/ - CosCMS is a simple framework for building web application. It is intended for users, who wants some common modules, and a platform with a small code base which is easy to extend. [3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures. [4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types. | |
HTB23127: Multiple Command Execution Vulnerabilities in Smartphone Pentest Framework (SPF)
HTB23123: Multiple Vulnerabilities in Smartphone Pentest Framework (SPF)
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.