Description
Schlix CMS 2.2.6-6 contains a remote code execution vulnerability that allows authenticated attackers to execute arbitrary PHP code by uploading malicious extension packages through the block manager. Attackers can upload a crafted ZIP file containing PHP code in the packageinfo.inc file and trigger execution by accessing the About tab of the installed extension.
Problem types
Improper Control of Generation of Code ('Code Injection')
Product status
Credits
Eren Saraç
References
www.exploit-db.com/exploits/49838 (ExploitDB-49838)
www.schlix.com/ (Official Product Homepage)
www.schlix.com/downloads/schlix-cms/schlix-cms-v2.2.6-6.zip (Product Reference)
www.vulncheck.com/...te-code-execution-via-core-blockmanager (VulnCheck Advisory: Schlix CMS 2.2.6-6 Remote Code Execution via core.blockmanager)