Description
TextPattern CMS 4.8.7 contains a remote code execution vulnerability that allows authenticated attackers to execute arbitrary commands by uploading malicious PHP files through the file upload functionality. Attackers can upload a PHP shell via the Files section in the content area and execute commands by accessing the uploaded file at /textpattern/files/ with GET parameters passed to the system function.
Problem types
Unrestricted Upload of File with Dangerous Type
Product status
Credits
Mert Daş merterpreter@gmail.com
References
www.exploit-db.com/exploits/49996 (ExploitDB-49996)
www.exploit-db.com/exploits/50415 (ExploitDB-50415)
www.vulncheck.com/...s-remote-code-execution-via-file-upload (VulnCheck Advisory: TextPattern CMS 4.8.7 Remote Code Execution via File Upload)