CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Cmsmadesimple » Cms Made Simple » 2.2.7 : Security Vulnerabilities

Cpe Name:cpe:/a:cmsmadesimple:cms_made_simple:2.2.7
Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2018-1000158 732 2018-04-18 2019-10-02
4.3
None Remote Medium Not required Partial None None
cmsmadesimple version 2.2.7 contains a Incorrect Access Control vulnerability in the function of send_recovery_email in the line "$url = $config['admin_url'] . '/login.php?recoverme=' . $code;" that can result in Administrator Password Reset Poisoning, specifically a reset URL pointing at an attacker controlled server can be created by using a host header attack.
2 CVE-2018-18271 79 XSS 2018-10-12 2018-11-28
4.3
None Remote Medium Not required None Partial None
XSS exists in CMS Made Simple version 2.2.7 via the m1_extra parameter in an admin/moduleinterface.php "Content-->News-->Add Article" action.
3 CVE-2018-18270 79 XSS 2018-10-12 2018-11-28
4.3
None Remote Medium Not required None Partial None
XSS exists in CMS Made Simple version 2.2.7 via the m1_news_url parameter in an admin/moduleinterface.php "Content-->News-->Add Article" action.
4 CVE-2018-10523 200 +Info 2018-04-27 2018-05-24
5.0
None Remote Low Not required Partial None None
CMS Made Simple (CMSMS) through 2.2.7 contains a physical path leakage Vulnerability via /modules/DesignManager/action.ajax_get_templates.php, /modules/DesignManager/action.ajax_get_stylesheets.php, /modules/FileManager/dunzip.php, or /modules/FileManager/untgz.php.
5 CVE-2018-10522 200 +Info 2018-04-27 2018-05-24
4.0
None Remote Low Single system Partial None None
In CMS Made Simple (CMSMS) through 2.2.7, the "file view" operation in the admin dashboard contains a sensitive information disclosure vulnerability, exploitable by ordinary users, because the product exposes unrestricted access to the PHP file_get_contents function.
6 CVE-2018-10521 434 2018-04-27 2018-05-24
4.0
None Remote Low Single system None None Partial
In CMS Made Simple (CMSMS) through 2.2.7, the "file move" operation in the admin dashboard contains an arbitrary file movement vulnerability that can cause DoS, exploitable by an admin user, because config.php can be moved into an incorrect directory.
7 CVE-2018-10520 732 2018-04-27 2019-10-02
8.5
None Remote Low Single system None Complete Complete
In CMS Made Simple (CMSMS) through 2.2.7, the "module remove" operation in the admin dashboard contains an arbitrary file deletion vulnerability that can cause DoS, exploitable by an admin user, because the attacker can remove all lib/ files in all directories.
8 CVE-2018-10519 732 2018-04-27 2019-10-02
6.5
None Remote Low Single system Partial Partial Partial
CMS Made Simple (CMSMS) 2.2.7 contains a privilege escalation vulnerability from ordinary user to admin user by arranging for the eff_uid value within $_COOKIE[$this->_loginkey] to equal 1, because files in the tmp/ directory are accessible through HTTP requests. NOTE: this vulnerability exists because of an incorrect fix for CVE-2018-10084.
9 CVE-2018-10518 732 2018-04-27 2019-10-02
8.5
None Remote Low Single system None Complete Complete
In CMS Made Simple (CMSMS) through 2.2.7, the "file delete" operation in the admin dashboard contains an arbitrary file deletion vulnerability that can cause DoS, exploitable by an admin user, because the attacker can remove all lib/ files in all directories.
10 CVE-2018-10517 94 Exec Code 2018-04-27 2018-11-08
6.5
None Remote Low Single system Partial Partial Partial
In CMS Made Simple (CMSMS) through 2.2.7, the "module import" operation in the admin dashboard contains a remote code execution vulnerability, exploitable by an admin user, because an XML Package can contain base64-encoded PHP code in a data element.
11 CVE-2018-10516 200 +Info 2018-04-27 2018-05-24
5.5
None Remote Low Single system Partial None Partial
In CMS Made Simple (CMSMS) through 2.2.7, the "file rename" operation in the admin dashboard contains a sensitive information disclosure vulnerability, exploitable by an admin user, that can cause DoS by moving config.php to the upload/ directory.
12 CVE-2018-10515 94 Exec Code 2018-04-27 2018-05-24
6.5
None Remote Low Single system Partial Partial Partial
In CMS Made Simple (CMSMS) through 2.2.7, the "file unpack" operation in the admin dashboard contains a remote code execution vulnerability exploitable by an admin user because a .php file can be present in the extracted ZIP archive.
13 CVE-2018-10086 94 Exec Code Bypass 2018-04-13 2019-10-02
6.5
None Remote Low Single system Partial Partial Partial
CMS Made Simple (CMSMS) through 2.2.7 contains an arbitrary code execution vulnerability in the admin dashboard because the implementation uses "eval('function testfunction'.rand()" and it is possible to bypass certain restrictions on these "testfunction" functions.
14 CVE-2018-10083 22 Dir. Trav. 2018-04-13 2018-04-13
6.4
None Remote Low Not required None Partial Partial
CMS Made Simple (CMSMS) through 2.2.7 contains an arbitrary file deletion vulnerability in the admin dashboard via directory traversal sequences in the val parameter within a cmd=del request, because code under modules\FilePicker does not restrict the val parameter.
15 CVE-2018-10082 200 +Info 2018-04-13 2018-04-13
5.0
None Remote Low Not required Partial None None
CMS Made Simple (CMSMS) through 2.2.7 allows physical path leakage via an invalid /index.php?page= value, a crafted URI starting with /index.php?mact=Search, or a direct request to /admin/header.php, /admin/footer.php, /lib/tasks/class.ClearCache.task.php, or /lib/tasks/class.CmsSecurityCheck.task.php.
16 CVE-2018-10081 640 2018-04-13 2018-04-17
5.0
None Remote Low Not required Partial None None
CMS Made Simple (CMSMS) through 2.2.6 contains an admin password reset vulnerability because data values are improperly compared, as demonstrated by a hash beginning with the "0e" substring.
17 CVE-2018-10033 79 XSS 2018-04-11 2018-04-13
3.5
None Remote Medium Single system None Partial None
CMS Made Simple (aka CMSMS) 2.2.7 has Stored XSS in admin/siteprefs.php via the metadata parameter.
18 CVE-2018-10032 79 XSS 2018-04-11 2018-04-13
3.5
None Remote Medium Single system None Partial None
CMS Made Simple (aka CMSMS) 2.2.7 has Reflected XSS in admin/moduleinterface.php via the m1_version parameter.
19 CVE-2018-10031 352 CSRF 2018-04-11 2018-04-13
6.8
None Remote Medium Not required Partial Partial Partial
CMS Made Simple (aka CMSMS) 2.2.7 has CSRF in admin/moduleinterface.php.
20 CVE-2018-10030 352 CSRF 2018-04-11 2018-04-13
6.8
None Remote Medium Not required Partial Partial Partial
CMS Made Simple (aka CMSMS) 2.2.7 has CSRF in admin/siteprefs.php.
21 CVE-2018-10029 79 XSS 2018-04-11 2018-04-13
3.5
None Remote Medium Single system None Partial None
CMS Made Simple (aka CMSMS) 2.2.7 has Reflected XSS in admin/moduleinterface.php via the m1_name parameter, related to moduledepends, a different vulnerability than CVE-2017-16799.
22 CVE-2018-9921 22 Dir. Trav. 2018-04-23 2018-05-25
5.0
None Remote Low Not required Partial None None
In CMS Made Simple 2.2.7, a Directory Traversal issue makes it possible to determine the existence of files and directories outside the web-site installation directory, and determine whether a file has contents matching a specified checksum. The attack uses an admin/checksum.php?__c= request.
Total number of vulnerabilities : 22   Page : 1 (This Page)
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.