First published: Tue Mar 26 2019(Updated: )
An issue was discovered in CMS Made Simple 2.2.8. It is possible, with an administrator account, to achieve command injection by modifying the path of the e-mail executable in Mail Settings, setting "sendmail" in the "Mailer" option, and launching the "Forgot your password" feature.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cmsmadesimple Cms Made Simple | <=2.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue in CMS Made Simple is CVE-2019-9059.
The severity of vulnerability CVE-2019-9059 is high with a CVSS score of 7.2.
The vulnerability CVE-2019-9059 in CMS Made Simple occurs due to command injection in the Mail Settings feature when an administrator modifies the path of the e-mail executable.
No, an attacker cannot exploit this vulnerability remotely.
To fix the vulnerability CVE-2019-9059 in CMS Made Simple, update to version 2.2.10 or later.