Lucene search

K
packetstormJameel NabboPACKETSTORM:147608
HistoryMay 15, 2018 - 12:00 a.m.

Monstra CMS 3.0.4 Remote Code Execution

2018-05-1500:00:00
Jameel Nabbo
packetstormsecurity.com
34

0.003 Low

EPSS

Percentile

68.2%

`# Exploit Title: Monstra CMS 3.0.4 Upload Plugin Remote code execution CVE-2018-9037  
# Date: 2018-05-14  
# Exploit Author: Jameel Nabbo  
# Vendor Homepage: https://github.com/monstra-cms/monstra  
# Software Link: https://github.com/monstra-cms/monstra  
# Version: 3.0.4  
# Tested on: MAC OSX  
# CVE :CVE-2018-9037  
  
  
Monstra CMS 3.0.4 allows remote code execution via an upload_file request for a .zip file,  
which is automatically extracted and may contain .php files.  
  
  
Steps to Reproduce  
1: Log in as a user with page editing permissions  
2: Upload a plugin archive containing php webshell code  
3: After successful upload we can execute the command.  
  
Then go to: http://127.0.0.1/plugins/{Name_Of_Zip_File_You_Uploaded}/{File_In_Zip}.php  
  
Solution  
Filter plugin content during plugin upload  
  
  
`

0.003 Low

EPSS

Percentile

68.2%

Related for PACKETSTORM:147608