First published: Thu Oct 19 2023(Updated: )
An issue in GetSimpleCMS v.3.4.0a allows a remote attacker to execute arbitrary code via a crafted payload to the phpinfo().
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
=3.4.0a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46042 is a vulnerability in GetSimpleCMS v.3.4.0a that allows a remote attacker to execute arbitrary code via a crafted payload to the phpinfo().
CVE-2023-46042 has a severity rating of 9.8, which is considered critical.
As a cybersecurity analyst, I cannot provide instructions on exploiting vulnerabilities. It is recommended to follow responsible disclosure practices and report the vulnerability to the software vendor.
A fix for CVE-2023-46042 is not available at the moment. It is recommended to stay updated with the latest security advisories from GetSimpleCMS and apply patches or updates as soon as they are released.
You can find more information about CVE-2023-46042 in the GitHub page provided as a reference: https://github.com/Num-Nine/CVE/wiki/A-file-write-vulnerability-exists-in-GetSimpleCMS