A vulnerability was found in wuzhicms 4.1.0. It has been classified as critical. Affected is the function add/edit of the file www/coreframe/app/content/admin/block.php. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Initially two separate issues were created by the researcher for the different function calls. The vendor was contacted early about this disclosure but did not respond in any way.
History

Wed, 30 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Wuzhicms
Wuzhicms wuzhicms
CPEs cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*
Vendors & Products Wuzhicms
Wuzhicms wuzhicms
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 30 Oct 2024 02:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in wuzhicms 4.1.0. It has been classified as critical. Affected is the function add/edit of the file www/coreframe/app/content/admin/block.php. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Initially two separate issues were created by the researcher for the different function calls. The vendor was contacted early about this disclosure but did not respond in any way.
Title wuzhicms block.php edit code injection
Weaknesses CWE-94
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-10-30T01:31:04.245Z

Updated: 2024-10-30T14:59:37.991Z

Reserved: 2024-10-29T17:42:34.123Z

Link: CVE-2024-10505

cve-icon Vulnrichment

Updated: 2024-10-30T13:43:37.499Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-30T02:15:02.430

Modified: 2024-11-06T16:38:28.750

Link: CVE-2024-10505

cve-icon Redhat

No data.