Description
Evolution CMS 3.1.6 contains a remote code execution vulnerability that allows authenticated users with module creation permissions to execute arbitrary system commands by injecting PHP code into module parameters. Attackers can send POST requests to /manager/index.php with malicious PHP code in the 'post' parameter to create modules that execute arbitrary commands when invoked.
Problem types
Improper Control of Generation of Code ('Code Injection')
Product status
Credits
Halit AKAYDIN (hLtAkydn)
References
www.exploit-db.com/exploits/50296 (ExploitDB-50296)
evo.im/ (Official Product Homepage)
github.com/evolution-cms/evolution/releases (Product Reference)
www.vulncheck.com/...mote-code-execution-via-module-creation (VulnCheck Advisory: Evolution CMS 3.1.6 Authenticated Remote Code Execution via Module Creation)