Vulnerabilities > CVE-2019-9055 - Deserialization of Untrusted Data vulnerability in Cmsmadesimple CMS Made Simple
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
An issue was discovered in CMS Made Simple 2.2.8. In the module DesignManager (in the files action.admin_bulk_css.php and action.admin_bulk_template.php), with an unprivileged user with Designer permission, it is possible reach an unserialize call with a crafted value in the m1_allparms parameter, and achieve object injection.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Metasploit
description | An issue was discovered in CMS Made Simple 2.2.8. In the module DesignManager (in the files action.admin_bulk_css.php and action.admin_bulk_template.php), with an unprivileged user with Designer permission, it is possible to reach an unserialize call with a crafted value in the m1_allparms parameter, and achieve object injection. This module has been successfully tested on CMS Made Simple versions 2.2.6, 2.2.7, 2.2.8, 2.2.9 and 2.2.9.1. |
id | MSF:EXPLOIT/MULTI/HTTP/CMSMS_OBJECT_INJECTION_RCE |
last seen | 2020-06-14 |
modified | 2019-11-13 |
published | 2019-11-01 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/multi/http/cmsms_object_injection_rce.rb |
title | CMS Made Simple Authenticated RCE via object injection |
Packetstorm
data source | https://packetstormsecurity.com/files/download/155322/cmsms_object_injection_rce.rb.txt |
id | PACKETSTORM:155322 |
last seen | 2019-11-14 |
published | 2019-11-13 |
reporter | Daniele Scanu |
source | https://packetstormsecurity.com/files/155322/CMS-Made-Simple-2.2.8-Remote-Code-Execution.html |
title | CMS Made Simple 2.2.8 Remote Code Execution |
References
- http://packetstormsecurity.com/files/155322/CMS-Made-Simple-2.2.8-Remote-Code-Execution.html
- https://blog.certimetergroup.com/it/articolo/security/CMS_Made_Simple_deserialization_attack_%28CVE-2019-9055%29
- https://newsletter.cmsmadesimple.org/w/89247Qog4jCRCuRinvhsofwg
- https://www.cmsmadesimple.org/2019/03/Announcing-CMS-Made-Simple-v2.2.10-Spuzzum
- http://packetstormsecurity.com/files/155322/CMS-Made-Simple-2.2.8-Remote-Code-Execution.html
- https://www.cmsmadesimple.org/2019/03/Announcing-CMS-Made-Simple-v2.2.10-Spuzzum
- https://newsletter.cmsmadesimple.org/w/89247Qog4jCRCuRinvhsofwg
- https://blog.certimetergroup.com/it/articolo/security/CMS_Made_Simple_deserialization_attack_%28CVE-2019-9055%29