Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
InstantCMS <= 1.6 Remote PHP Code Execution
Vulnerability Description
A remote PHP code execution vulnerability exists in InstantCMS version 1.6 and earlier due to unsafe use of eval() within the search view handler. Specifically, user-supplied input passed via the look parameter is concatenated into a PHP expression and executed without proper sanitation. A remote attacker can exploit this flaw by sending a crafted HTTP GET request with a base64-encoded payload in the Cmd header, resulting in arbitrary PHP code execution within the context of the web server.
CVSS Information
N/A
Vulnerability Type
动态执行代码中指令转义处理不恰当(Eval注入)
Vulnerability Title
InstantCMS 安全漏洞
Vulnerability Description
InstantCMS是instantSoft开源的一个免费的开源 CMS。 InstantCMS 1.6及之前版本存在安全漏洞,该漏洞源于eval函数使用不当,可能导致远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A