cve/2024/CVE-2024-30162.md
2024-06-18 02:51:15 +02:00

18 lines
1.0 KiB
Markdown

### [CVE-2024-30162](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30162)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Invision Community through 4.7.16 allows remote code execution via the applications/core/modules/admin/editor/toolbar.php IPS\core\modules\admin\editor\_toolbar::addPlugin() method. This method handles uploaded ZIP files that are extracted into the applications/core/interface/ckeditor/ckeditor/plugins/ directory without properly verifying their content. This can be exploited by admin users (with the toolbar_manage permission) to write arbitrary PHP files into that directory, leading to execution of arbitrary PHP code in the context of the web server user.
### POC
#### Reference
- http://seclists.org/fulldisclosure/2024/Apr/21
#### Github
No PoCs found on GitHub currently.