CVE-2013-1668

Coscms < 1.721 - OS Command Injection

Title source: rule
STIX 2.1

Description

The uploadFile function in upload/index.php in CosCMS before 1.822 allows remote administrators to execute arbitrary commands via shell metacharacters in the name of an uploaded file.

Exploits (1)

exploitdb WORKING POC
by High-Tech Bridge SA · textwebappsphp
https://www.exploit-db.com/exploits/24629

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/90927
Various Sources x_refsource_confirm
http://www.coscms.org/blog/view/4/Version-1.822
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/58332
Vendor Advisory x_refsource_misc
https://www.htbridge.com/advisory/HTB23145
Third Party Advisory mailing-list x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2013-03/0033.html
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/24629

Scores

EPSS 0.0911
EPSS Percentile 92.7%

Details

CWE
CWE-78
Status published
Products (3)
coscms/coscms 1.3
coscms/coscms 1.41
coscms/coscms < 1.721
Published May 23, 2014
Tracked Since Feb 18, 2026