Vulnerability Description
PHPMyWind 5.6 is vulnerable to Remote Code Execution. Becase input is filtered without "<, >, ?, =, `,...." In WriteConfig() function, an attacker can inject php code to /include/config.cache.php file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpmywind | Phpmywind | 5.6 |
Related Weaknesses (CWE)
References
- https://github.com/KietNA-HPT/CVEExploitThird Party Advisory
- https://github.com/gaozhifeng/PHPMyWind/issues/15ExploitThird Party Advisory
- https://github.com/KietNA-HPT/CVEExploitThird Party Advisory
- https://github.com/gaozhifeng/PHPMyWind/issues/15ExploitThird Party Advisory
FAQ
What is CVE-2021-39503?
CVE-2021-39503 is a vulnerability with a CVSS score of 7.2 (HIGH). PHPMyWind 5.6 is vulnerable to Remote Code Execution. Becase input is filtered without "<, >, ?, =, `,...." In WriteConfig() function, an attacker can inject php code to /include/config.cache.php file...
How severe is CVE-2021-39503?
CVE-2021-39503 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-39503?
Check the references section above for vendor advisories and patch information. Affected products include: Phpmywind Phpmywind.