Vulnerability Details : CVE-2018-16784
Potential exploit
DedeCMS 5.7 SP2 allows XML injection, and resultant remote code execution, via a "<file type='file' name='../" substring.
Vulnerability category: Execute code
Products affected by CVE-2018-16784
- cpe:2.3:a:dedecms:dedecms:5.7:sp2:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-16784
0.36%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-16784
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
7.2
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
CWE ids for CVE-2018-16784
-
The product does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-16784
-
https://github.com/ky-j/dedecms/issues/3
XML injection vulnerability exists in the file of DedeCMS V5.7 SP2 version, which can be utilized by attackers to upload script file to obtain webshell. · Issue #3 · ky-j/dedecms · GitHubExploit;Third Party Advisory
Jump to