Description
ImpressCMS 1.4.2 contains a remote code execution vulnerability in the autotasks administrative interface that allows authenticated attackers to execute arbitrary PHP code by injecting malicious code into the sat_code parameter. Attackers can authenticate, submit a POST request to /modules/system/admin.php?fct=autotasks&op=mod with crafted sat_code containing PHP commands, which creates an executable file that accepts arbitrary commands via GET parameters.
Problem types
Improper Control of Generation of Code ('Code Injection')
Product status
Credits
Halit AKAYDIN (hLtAkydn)
References
www.exploit-db.com/exploits/50298 (ExploitDB-50298)
www.impresscms.org/ (Official Product Homepage)
www.impresscms.org/modules/downloads/ (Product Reference)
www.vulncheck.com/...cms-remote-code-execution-via-autotasks (VulnCheck Advisory: ImpressCMS 1.4.2 Remote Code Execution via Autotasks)