CVE-2020-24804
https://notcve.org/view.php?id=CVE-2020-24804
Plaintext Password vulnerability in AddAdmin.py in cms-dev/cms v1.4.rc1, allows attackers to gain sensitive information via audit logs. • https://github.com/cms-dev/cms/issues/1160 • CWE-532: Insertion of Sensitive Information into Log File •
CVE-2023-34916
https://notcve.org/view.php?id=CVE-2023-34916
Fuge CMS v1.0 contains an Open Redirect vulnerability via /front/ProcessAct.java. • https://github.com/fuge/cms/issues/4 https://payatu.com/advisory/unvalidated-open-redirection-fuge-cms-v1-0 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •
CVE-2023-34917
https://notcve.org/view.php?id=CVE-2023-34917
Fuge CMS v1.0 contains an Open Redirect vulnerability in member/RegisterAct.java. • https://github.com/fuge/cms/issues/3 https://payatu.com/advisory/unvalidated-redirection-vulnerability-in-fuge-cms-v1-0 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •
CVE-2022-45544
https://notcve.org/view.php?id=CVE-2022-45544
Insecure Permission vulnerability in Schlix Web Inc SCHLIX CMS 2.2.7-2 allows attacker to upload arbitrary files and execute arbitrary code via the tristao parameter. NOTE: this is disputed by the vendor because an admin is intentionally allowed to upload new executable PHP code, such as a theme that was obtained from a trusted source or was developed for their own website. Only an admin can upload such code, not someone else in an "attacker" role. • https://github.com/tristao-marinho/CVE-2022-45544 https://blog.tristaomarinho.com/schlix-cms-2-2-7-2-arbitrary-file-upload https://github.com/tristao-marinho/CVE-2022-45544/blob/main/README.md https://www.schlix.com https://www.schlix.com/downloads/schlix-cms/schlix-cms-v2.2.7-2.zip • CWE-863: Incorrect Authorization •
CVE-2019-11021
https://notcve.org/view.php?id=CVE-2019-11021
admin/app/mediamanager in Schlix CMS 2.1.8-7 allows Authenticated Unrestricted File Upload, leading to remote code execution. NOTE: "While inadvertently allowing a PHP file to be uploaded via Media Manager was an oversight, it still requires an admin permission. We think it's pretty rare for an administrator to exploit a bug on his/her own site to own his/her own site. ** EN DISPUTA ** El archivo admin/app/mediamanager en Schlix CMS versión 2.1.8-7, permite una carga de archivos sin restricciones autenticada, lo que conlleva a la ejecución de código remota. NOTA: "Si bien, sin darse cuenta, permite que un archivo PHP se cargue a través de Media Manager fue un descuido,aunque se requiere un permiso de administrador. Creemos que es bastante raro que un administrador explote un error en su propio sitio para tener su propio sitio ". • https://gurelahmet.com/schlix-cms-v2-1-8-7-authenticated-unrestricted-file-upload-to-rce https://vuldb.com/?id.144129 https://www.incibe-cert.es/en/early-warning/vulnerabilities/cve-2019-11021 https://www.schlix.com/html/schlix-cms-downloads.html https://www.schlix.com/news/security/cve-2019-11021-for-older-schlix-cms-v2-1-8-7-november-2018.html • CWE-434: Unrestricted Upload of File with Dangerous Type •