Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2018-16763
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter or the preview/ data parameter. This can lead to Pre-Auth Remote Code Execution.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
FUEL CMS 注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
FUEL CMS是一款基于Codelgniter框架的内容管理系统(CMS)。 FUEL CMS 1.4.1版本中的pages/select/页面的‘filter’参数和preview/页面的‘data’参数存在注入漏洞。该漏洞源于用户输入构造命令、数据结构或记录的操作过程中,网络系统或产品缺乏对用户输入数据的正确验证,未过滤或未正确过滤掉其中的特殊元素,导致系统或产品产生解析或解释方式错误。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2018-16763
#POC DescriptionSource LinkShenlong Link
1CVE 2018-16763https://github.com/dinhbaouit/CVE-2018-16763POC Details
2This is an updated version of the CVE-2018-16763 for fuelCMS 1.4.1https://github.com/hikarihacks/CVE-2018-16763-exploitPOC Details
3Nonehttps://github.com/n3m1dotsys/CVE-2018-16763-Exploit-Python3POC Details
4Rust implementation of CVE-2018-16763 with some extra features.https://github.com/uwueviee/Fu3l-F1lt3rPOC Details
5A working PoC to CVE-2018-16763 https://github.com/shoamshilo/Fuel-CMS-Remote-Code-Execution-1.4--RCE--POC Details
6FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter or the preview/ data parameter. This can lead to Pre-Auth Remote Code Execution.https://github.com/kxisxr/Bash-Script-CVE-2018-16763POC Details
7Fuel CMS 1.4.1 - Remote Code Executionhttps://github.com/padsalatushal/CVE-2018-16763POC Details
8A write up on the THM room Vulnerability Capstone & Exploit script for CVE-2018-16763.https://github.com/wizardy0ga/THM-Vulnerability_Capstone-CVE-2018-16763POC Details
9Nonehttps://github.com/crypticdante/CVE-2018-16763POC Details
10Nonehttps://github.com/BrunoPincho/cve-2018-16763-rustPOC Details
11Nonehttps://github.com/NaturalT314/CVE-2018-16763POC Details
12Exploit to trigger RCE for CVE-2018-16763 on FuelCMS <= 1.4.1 and interactive shell. https://github.com/p0dalirius/CVE-2018-16763-FuelCMS-1.4.1-RCEPOC Details
13CVE-2018-16763 FuelCMS 1.4 Remote Code Execution, this version of FuelCMS is still vulnerable until nowhttps://github.com/not1cyyy/CVE-2018-16763POC Details
14Nonehttps://github.com/antisecc/CVE-2018-16763POC Details
15Fuel CMS 1.4.1 - Remote Code Execution - Python 3.xhttps://github.com/VitoBonetti/CVE-2018-16763POC Details
16Nonehttps://github.com/H3xL00m/CVE-2018-16763POC Details
17Nonehttps://github.com/n3ov4n1sh/CVE-2018-16763POC Details
18Nonehttps://github.com/n3m1sys/CVE-2018-16763-Exploit-Python3POC Details
19Nonehttps://github.com/c0d3cr4f73r/CVE-2018-16763POC Details
20Nonehttps://github.com/Sp3c73rSh4d0w/CVE-2018-16763POC Details
21Nonehttps://github.com/0xwh1pl4sh/CVE-2018-16763POC Details
22Nonehttps://github.com/N3rdyN3xus/CVE-2018-16763POC Details
23Nonehttps://github.com/Luigi31415/CVE-2018-16763POC Details
24Nonehttps://github.com/NyxByt3/CVE-2018-16763POC Details
25Nonehttps://github.com/h3xcr4ck3r/CVE-2018-16763POC Details
26Nonehttps://github.com/n3rdh4x0r/CVE-2018-16763POC Details
27A Proof-of-Concept (PoC) exploit for CVE-2018-16763 (Fuel CMS - Preauthenticated Remote Code Execution).https://github.com/saccles/CVE-2018-16763-Proof-of-ConceptPOC Details
28Fuel CMS 1.4.1 - Remote Code Executionhttps://github.com/altsun/CVE-2018-16763-FuelCMS-1.4.1-RCEPOC Details
29Nonehttps://github.com/Kz0x-337/CVE-2018-16763POC Details
30A Proof-of-Concept (PoC) exploit for CVE-2018-16763 (Fuel CMS - Preauthenticated Remote Code Execution).https://github.com/saccles/CVE_2018_16763_Proof_of_ConceptPOC Details
31FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter or the preview/ data parameter.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-16763.yamlPOC Details
32The goal of this project was to conduct a security audit of a blog recently launched by Ackme Support Incorporated, identifying any critical vulnerabilities before the site goes public. The task involved finding a way to remotely execute code and gain access to the target system.https://github.com/ArtemCyberLab/Project-Exploiting-a-Vulnerability-in-Fuel-CMS-CVE-2018-16763-POC Details
33Nonehttps://github.com/h3x0v3rl0rd/CVE-2018-16763POC Details
34FuelCMS 1.4.1 Command Injection/Remote Code Execution.https://github.com/B7T3/CVE-2018-16763_FuelCMS-1.4.1_RCEPOC Details
35exploit for CVE-2018-16763https://github.com/Cyberuser-hash/CVE-2018-16763POC Details
36Python3 exploit for Fuel CMS 1.4.1 Remote Code Execution (CVE-2018-16763) with Reverse Shell.https://github.com/kaxm23/exploit_cms_fuelPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2018-16763
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2018-16763

No comments yet


Leave a comment