First published: Sun Nov 25 2018(Updated: )
An issue was discovered in SDCMS 1.6 with PHP 5.x. app/admin/controller/themecontroller.php uses a check_bad function in an attempt to block certain PHP functions such as eval, but does not prevent use of preg_replace 'e' calls, allowing users to execute arbitrary code by leveraging access to admin template management.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sdcms | =1.6 | |
PHP | >=5.0.0<=5.6.38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19520 is categorized as a critical vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2018-19520, ensure you upgrade SDCMS to a newer version that addresses this vulnerability and avoid using PHP 5.x.
CVE-2018-19520 affects SDCMS version 1.6 running on PHP versions from 5.0.0 to 5.6.38.
Yes, CVE-2018-19520 can be exploited remotely if an attacker has access to the administrative interface of the affected SDCMS application.
CVE-2018-19520 can facilitate arbitrary code execution attacks, allowing attackers to execute malicious code on the server.