module

CMS Made Simple Authenticated RCE via object injection

Disclosed
2019-03-26
Created
2019-11-13

Description

An issue was discovered in CMS Made Simple 2.2.8.
In the module DesignManager (in the files action.admin_bulk_css.php
and action.admin_bulk_template.php), with an unprivileged user
with Designer permission, it is possible to reach an unserialize
call with a crafted value in the m1_allparms parameter,
and achieve object injection.

This module has been successfully tested on CMS Made Simple versions
2.2.6, 2.2.7, 2.2.8, 2.2.9 and 2.2.9.1.

Author

Daniele Scanu danielescanu20 Daniele Scanu danielescanu20@gmail.com

Platform

PHP

Architectures

php

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/multi/http/cmsms_object_injection_rce
msf exploit(cmsms_object_injection_rce) > show targets
...targets...
msf exploit(cmsms_object_injection_rce) > set TARGET < target-id >
msf exploit(cmsms_object_injection_rce) > show options
...show and set options...
msf exploit(cmsms_object_injection_rce) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.