An issue found in ProcessWire 3.0.210 allows attackers to execute arbitrary code and install a reverse shell via the download_zip_url parameter when installing a new module. NOTE: this is disputed because exploitation requires that the attacker is able to enter requests as an admin; however, a ProcessWire admin is intentionally allowed to install any module that contains any arbitrary code.
References
Link | Resource |
---|---|
https://medium.com/%40cupc4k3/reverse-shell-via-remote-file-inlusion-in-proccesswire-cms-a8fa5ace3255 | Exploit Third Party Advisory |
https://medium.com/%40cupc4k3/reverse-shell-via-remote-file-inlusion-in-proccesswire-cms-a8fa5ace3255 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-01-24 21:15
Updated : 2024-11-21 07:48
NVD link : CVE-2023-24676
Mitre link : CVE-2023-24676
CVE.ORG link : CVE-2023-24676
JSON object : View
Products Affected
processwire
- processwire
CWE