Tag
#rce
Extbase request handling fails to implement a proper access check for requested controller/ action combinations, which makes it possible for an attacker to execute arbitrary Extbase actions by crafting a special request. To successfully exploit this vulnerability, an attacker must have access to at least one Extbase plugin or module action in a TYPO3 installation. The missing access check inevitably leads to information disclosure or remote code execution, depending on the action that an attacker is able to execute.
### Impact User with administrative privileges and upload files that look like images but contain PHP code which can then be executed in the context of the web server.
Red Hat Security Advisory 2024-3546-03 - An update for the ruby:3.1 module is now available for Red Hat Enterprise Linux 8.
Remote Code Execution can occur in versions of the MLflow platform running version 1.11.0 or newer, enabling a maliciously crafted MLproject to execute arbitrary code on an end user’s system when run due to unfiltered input.
FreePBX suffers from a remote code execution vulnerability. Versions 14, 15, and 16 are all affected.
appRain CMF version 4.0.5 suffers from a remote shell upload vulnerability.
Monstra CMS version 3.0.4 suffers from a remote code execution vulnerability. Original discovery of code execution in this version is attributed to Ishaq Mohammed in December of 2017.
Dotclear version 2.29 suffers from a remote code execution vulnerability.
WBCE CME version 1.6.2 suffers from a remote code execution vulnerability.
Serendipity version 2.5.0 suffers from a remote code execution vulnerability.