Description
WBCE CMS version 1.5.2 contains an authenticated remote code execution vulnerability that allows attackers to upload malicious droplets through the admin panel. Authenticated attackers can exploit the droplet upload functionality in the admin tools to create and execute arbitrary PHP code by crafting a specially designed zip file payload.
Problem types
Unrestricted Upload of File with Dangerous Type
Product status
Credits
Antonio Cuomo (arkantolo)
References
www.exploit-db.com/exploits/50707 (ExploitDB-50707)
wbce.org/ (WBCE CMS Official Website)
wbce.org/de/downloads/ (WBCE CMS Downloads Page)
github.com/WBCE/WBCE_CMS (WBCE CMS GitHub Repository)
www.vulncheck.com/...remote-code-execution-rce-authenticated (VulnCheck Advisory: WBCE CMS 1.5.2 - Remote Code Execution (RCE) (Authenticated))