CVE-2014-1683
SkyBlueCanvas CMS <1.1 r248-04 - RCE
Title source: llmDescription
The bashMail function in cms/data/skins/techjunkie/fragments/contacts/functions.php in SkyBlueCanvas CMS before 1.1 r248-04, when the pid parameter is 4, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) name, (2) email, (3) subject, or (4) message parameter to index.php.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/31432
exploitdb
WORKING POC
VERIFIED
by Scott Parish · textwebappsphp
https://www.exploit-db.com/exploits/31183
metasploit
WORKING POC
EXCELLENT
by Scott Parish · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/skybluecanvas_exec.rb
References (7)
Scores
EPSS
0.7784
EPSS Percentile
99.0%
Details
CWE
CWE-134
Status
published
Products (1)
skybluecanvas/skybluecanvas
< 1.1_r248-03
Published
Jan 29, 2014
Tracked Since
Feb 18, 2026