{ "Name": "EarCMS download.php Exec", "Description": "Ear CMS is a content management system. There is a Code Execution Vulnerability in the ear distribution foreground. By constructing malicious code, the attacker can obtain the permission of the server.", "Product": "EarCMS", "Homepage": "https://gobies.org/", "DisclosureDate": "2021-06-10", "Author": "gobysec@gmail.com", "GobyQuery": "body=\"icon-comma\"", "Level": "3", "Impact": "
Hackers can execute any command on the server and write the back door, so as to invade the server and obtain the administrator authority of the server.
Upgrade to the latest version.
", "References": [ "https://cn.gobies.org/" ], "HasExp": true, "ExpParams": [ { "name": "cmd", "type": "input", "value": "" } ], "ExpTips": { "Type": "", "Content": "" }, "ScanSteps": null, "ExploitSteps": null, "Tags": [ "RCE" ], "CVEIDs": null, "CVSSScore": "0.0", "AttackSurfaces": { "Application": null, "Support": null, "Service": null, "System": null, "Hardware": null } }