ID |
CVE-2025-49141
|
Sažetak |
HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.3, the `gitImportSite` functionality obtains a URL string from a POST request and insufficiently validates user input. The `set_remote` function later passes this input into `proc_open`, yielding OS command injection. An authenticated attacker can craft a URL string that bypasses the validation checks employed by the `filter_var` and `strpos` functions in order to execute arbitrary OS commands on the backend server. The attacker can exfiltrate command output via an HTTP request. Version 11.0.3 contains a patch for the issue. |
Reference |
|
CVSS |
Base: | 8.5 |
Impact: | 6.0 |
Exploitability: | 1.8 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
HIGH |
LOW |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
HIGH |
HIGH |
HIGH |
|
CVSS vektor |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
Zadnje važnije ažuriranje |
12-06-2025 - 16:06 |
Objavljeno |
09-06-2025 - 21:15 |