CVE-2024-30162
Invision Community 4.7.16 Remote Code Execution
Severity Score
Exploit Likelihood
Affected Versions
1Public Exploits
1Exploited in Wild
-Decision
Descriptions
Invision Community through 4.7.16 allows remote code execution via the applications/core/modules/admin/editor/toolbar.php IPS\core\modules\admin\editor\_toolbar::addPlugin() method. This method handles uploaded ZIP files that are extracted into the applications/core/interface/ckeditor/ckeditor/plugins/ directory without properly verifying their content. This can be exploited by admin users (with the toolbar_manage permission) to write arbitrary PHP files into that directory, leading to execution of arbitrary PHP code in the context of the web server user.
Invision Community hasta 4.7.16 permite la ejecución remota de código a través del método apps/core/modules/admin/editor/toolbar.php IPS\core\modules\admin\editor\_toolbar::addPlugin(). Este método maneja archivos ZIP cargados que se extraen en el directorio apps/core/interface/ckeditor/ckeditor/plugins/ sin verificar adecuadamente su contenido. Esto puede ser aprovechado por usuarios administradores (con el permiso toolbar_manage) para escribir archivos PHP arbitrarios en ese directorio, lo que lleva a la ejecución de código PHP arbitrario en el contexto del usuario del servidor web.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-03-24 CVE Reserved
- 2024-04-08 CVE Published
- 2024-04-08 First Exploit
- 2024-08-02 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-345: Insufficient Verification of Data Authenticity
CAPEC
References (3)
URL | Date | SRC |
---|
URL | Date | SRC |
---|