CVE-2014-1683
SkyBlueCanvas CMS <1.1 r248-04 - RCE
Title source: llmDescription
The bashMail function in cms/data/skins/techjunkie/fragments/contacts/functions.php in SkyBlueCanvas CMS before 1.1 r248-04, when the pid parameter is 4, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) name, (2) email, (3) subject, or (4) message parameter to index.php.
Exploits (3)
metasploit
WORKING POC
EXCELLENT
by Scott Parish · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/skybluecanvas_exec.rb
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/31432
exploitdb
WORKING POC
VERIFIED
by Scott Parish · textwebappsphp
https://www.exploit-db.com/exploits/31183
References (7)
Scores
EPSS
0.7853
EPSS Percentile
99.0%
Classification
CWE
CWE-134
Status
draft
Affected Products (1)
skybluecanvas/skybluecanvas
< 1.1_r248-03
Timeline
Published
Jan 29, 2014
Tracked Since
Feb 18, 2026