mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-01 11:11:27 +00:00
28 lines
1.4 KiB
JSON
28 lines
1.4 KiB
JSON
{
|
|
"id": "CVE-2024-27622",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-03-05T14:15:49.030",
|
|
"lastModified": "2024-06-21T22:15:10.647",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19 / 2.2.21. This vulnerability arises from inadequate sanitization of user-supplied input in the 'Code' section of the module. As a result, authenticated users with administrative privileges can inject and execute arbitrary PHP code."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se ha identificado una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el m\u00f3dulo Etiquetas definidas por el usuario de CMS Made Simple versi\u00f3n 2.2.19. Esta vulnerabilidad surge de una sanitizaci\u00f3n inadecuada de la entrada proporcionada por el usuario en la secci\u00f3n \"C\u00f3digo\" del m\u00f3dulo. Como resultado, los usuarios autenticados con privilegios administrativos pueden inyectar y ejecutar c\u00f3digo PHP arbitrario."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/capture0x/CMSMadeSimple/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://packetstormsecurity.com/files/177241/CMS-Made-Simple-2.2.19-Remote-Code-Execution.html",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |