First published: Mon May 08 2023(Updated: )
File upload vulnerability in CMS Made Simple through 2.2.15 allows remote authenticated attackers to gain a webshell via a crafted phar file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cmsmadesimple Cms Made Simple | <=2.2.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-28998 is high with a CVSS score of 7.2.
CVE-2021-28998 allows remote authenticated attackers to gain a webshell by exploiting a file upload vulnerability and uploading a crafted phar file.
Versions up to and including 2.2.15 of CMS Made Simple are affected by CVE-2021-28998.
Yes, remote attackers need to be authenticated to exploit CVE-2021-28998.
Yes, you can find references for CVE-2021-28998 at the following links: [reference 1](https://github.com/beerpwn/CVE/blob/master/cms_made_simple_2021/file_upload_RCE/File_upload_to_RCE.md), [reference 2](https://seclists.org/fulldisclosure/2021/Mar/50).