Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

a remote code execution vulnerability. #433

Open
sunu11 opened this issue Mar 28, 2018 · 2 comments
Open

a remote code execution vulnerability. #433

sunu11 opened this issue Mar 28, 2018 · 2 comments

Comments

@sunu11
Copy link

sunu11 commented Mar 28, 2018

Hi @Awilum,
I have found a remote code execution vulnerability.can you guide me how to disclose them. Should I create a new issue or should I email the details?

@sunu11
Copy link
Author

sunu11 commented Mar 29, 2018

I reported to the cve platform, they let me use CVE-2018-9037, you can contact them for details

@sunu11
Copy link
Author

sunu11 commented Apr 10, 2018

Vulnerability description
Monstra CMS 3.0.4 allows remote code execution via an upload_file request for a .zip file,
which is automatically extracted and may contain .php files.

Vulnerability Type
Command Execution Vulnerability

Expected Behavior
Command Execution

Steps to Reproduce
1、Log in as a user with page editing permissions
2、Upload a plugin archive containing php webshell code
image
image
image
3、After successful upload we can execute the command.

Possible Solutions
Filter plugin content during plugin upload

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant