Vulnerability Description
A remote PHP code execution vulnerability exists in InstantCMS version 1.6 and earlier due to unsafe use of eval() within the search view handler. Specifically, user-supplied input passed via the look parameter is concatenated into a PHP expression and executed without proper sanitation. A remote attacker can exploit this flaw by sending a crafted HTTP GET request with a base64-encoded payload in the Cmd header, resulting in arbitrary PHP code execution within the context of the web server.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Instantcms | Instantcms | <= 1.6.0 |
Related Weaknesses (CWE)
References
- https://packetstorm.news/files/id/122176Third Party Advisory
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/expThird Party Advisory
- https://www.exploit-db.com/exploits/26622Exploit
- https://www.vulncheck.com/advisories/instantcms-remote-php-code-executionThird Party Advisory
- https://www.exploit-db.com/exploits/26622Exploit
FAQ
What is CVE-2013-10051?
CVE-2013-10051 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A remote PHP code execution vulnerability exists in InstantCMS version 1.6 and earlier due to unsafe use of eval() within the search view handler. Specifically, user-supplied input passed via the look...
How severe is CVE-2013-10051?
CVE-2013-10051 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2013-10051?
Check the references section above for vendor advisories and patch information. Affected products include: Instantcms Instantcms.