Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-10517 PoC — CMS Made Simple 安全漏洞

Source
Associated Vulnerability
Title:CMS Made Simple 安全漏洞 (CVE-2018-10517)
Description:CMS Made Simple(CMSMS)是CMSMS团队开发的一套开源的内容管理系统(CMS)。该系统支持基于角色的权限管理系统、基于向导的安装与更新机制、智能缓存机制等。 CMSMS 2.2.7及之前版本中的管理员仪表盘的模块导入操作存在远程代码执行漏洞,该漏洞源于在创建文件时,程序没有限制文件类型。远程攻击者可利用该漏洞执行代码。
Description
CMS Made Simple 2.2.7 RCE exploit
Readme
# CVE-2018-12613
Authenticated remote command execution by uploading a fake module, dropping PHP files on remote web server.

# Software Affected
1. CMS Made Simple 2.2.7;

# How to use
This PowerShell scripts need two parameters to craft a exploit HTTP request:

    1. CMS Made Simple URL endpoint;
    2. Cookies for unauthenticated user;
    2. A command string to be executed in the remote system shell;

# Example

Prepare all the parameters to use the script:

![Screenshot](example.JPG)

Then command is executed.


Code author: @_zc00l
File Snapshot

[4.0K] /data/pocs/993e8147b968da3c589666319a4c41d0f906ae44 ├── [4.0K] CMS-MadeSimple-RCE.ps1 ├── [ 69K] example.JPG └── [ 544] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.