Description
TextPattern CMS 4.9.0-dev contains a remote code execution vulnerability that allows authenticated attackers to upload arbitrary PHP files by exploiting the plugin upload functionality. Attackers can authenticate, retrieve a CSRF token from the plugin event page, and upload malicious PHP files to the textpattern/tmp/ directory for code execution.
Problem types
Cross-Site Request Forgery (CSRF)
Product status
Credits
Mevlüt Akçam
References
www.exploit-db.com/exploits/50095 (ExploitDB-50095)
textpattern.com/ (Official Product Homepage)
github.com/textpattern/textpattern (Product Reference)
www.vulncheck.com/...remote-code-execution-via-plugin-upload (VulnCheck Advisory: TextPattern CMS 4.9.0-dev Authenticated Remote Code Execution via Plugin Upload)