Rapid7 Vulnerability & Exploit Database

CMS Made Simple Authenticated RCE via object injection

Back to Search

CMS Made Simple Authenticated RCE via object injection

Disclosed
03/26/2019
Created
11/13/2019

Description

An issue was discovered in CMS Made Simple 2.2.8. In the module DesignManager (in the files action.admin_bulk_css.php and action.admin_bulk_template.php), with an unprivileged user with Designer permission, it is possible to reach an unserialize call with a crafted value in the m1_allparms parameter, and achieve object injection. This module has been successfully tested on CMS Made Simple versions 2.2.6, 2.2.7, 2.2.8, 2.2.9 and 2.2.9.1.

Author(s)

  • Daniele Scanu danielescanu20 <Daniele Scanu danielescanu20@gmail.com>

Platform

PHP

Architectures

php

Development

References

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/multi/http/cmsms_object_injection_rce
msf exploit(cmsms_object_injection_rce) > show targets
    ...targets...
msf exploit(cmsms_object_injection_rce) > set TARGET < target-id >
msf exploit(cmsms_object_injection_rce) > show options
    ...show and set options...
msf exploit(cmsms_object_injection_rce) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;