Description
Gila CMS versions prior to 2.0.0 contain a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands through manipulated HTTP headers. Attackers can inject PHP code in the User-Agent header with shell_exec() to run system commands by sending crafted requests to the admin endpoint.
Problem types
Product status
Credits
Enesdex
References
www.exploit-db.com/exploits/49412 (ExploitDB-49412)
gilacms.com/ (Official Vendor Homepage)
github.com/GilaCMS/gila (Gila CMS GitHub Repository)
www.vulncheck.com/advisories/gila-cms-remote-code-execution (VulnCheck Advisory: Gila CMS < 2.0.0 - Remote Code Execution)