Description
e107 CMS 2.3.0 contains a remote code execution vulnerability that allows authenticated users with theme installation permissions to execute arbitrary commands by uploading malicious theme files. Attackers can upload a crafted theme package through the theme.php endpoint that deploys a web shell to the e107_themes directory, then execute system commands via the payload.php script.
Problem types
Unrestricted Upload of File with Dangerous Type
Product status
Credits
Halit AKAYDIN (hLtAkydn)
References
www.exploit-db.com/exploits/50315 (ExploitDB-50315)
e107.org/ (Official Product Homepage)
e107.org/download (Product Reference)
www.vulncheck.com/...-remote-code-execution-via-theme-upload (VulnCheck Advisory: e107 CMS 2.3.0 Authenticated Remote Code Execution via Theme Upload)