CVE-2014-1683

SkyBlueCanvas CMS <1.1 r248-04 - RCE

Title source: llm

Description

The bashMail function in cms/data/skins/techjunkie/fragments/contacts/functions.php in SkyBlueCanvas CMS before 1.1 r248-04, when the pid parameter is 4, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) name, (2) email, (3) subject, or (4) message parameter to index.php.

Exploits (3)

metasploit WORKING POC EXCELLENT
by Scott Parish · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/skybluecanvas_exec.rb
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/31432
exploitdb WORKING POC VERIFIED
by Scott Parish · textwebappsphp
https://www.exploit-db.com/exploits/31183

Scores

EPSS 0.7853
EPSS Percentile 99.0%

Classification

CWE
CWE-134
Status draft

Affected Products (1)

skybluecanvas/skybluecanvas < 1.1_r248-03

Timeline

Published Jan 29, 2014
Tracked Since Feb 18, 2026