2 results (0.001 seconds)

CVSS: 6.9EPSS: 0%CPEs: 12EXPL: 1

A vulnerability was found in bg5sbk MiniCMS up to 1.11 and classified as problematic. This issue affects some unknown processing of the file post-edit.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/bg5sbk/MiniCMS/issues/51 https://vuldb.com/?ctiid.278663 https://vuldb.com/?id.278663 https://vuldb.com/?submit.411164 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 3

miniCMS 1.0 and 2.0 allows remote attackers to execute arbitrary PHP code via a crafted (1) pagename or (2) area variable containing an executable extension, which is not properly handled by (a) update.php when writing files to content/, or (b) updatenews.php when writing files to content/news/. miniCMS v1.0 y v2.0, permite a atacantes remotos ejecutar código PHP arbitrario a través de la variable (1) pagename o (2) área manipuladas, que contiene una extensión ejecutable, que no se utilizan con cuidado por (a) update.php al escribir archivos en content/ o (b) updatenews.php al escribir archivos en content/news/. • https://www.exploit-db.com/exploits/18410 http://www.exploit-db.com/exploits/18410 http://www.securityfocus.com/bid/51612 https://exchange.xforce.ibmcloud.com/vulnerabilities/72645 • CWE-94: Improper Control of Generation of Code ('Code Injection') •