{ "Name": "EarCMS download.php Exec", "Description": "Ear CMS is a content management system. There is a Code Execution Vulnerability in the ear distribution foreground. By constructing malicious code, the attacker can obtain the permission of the server.", "Product": "EarCMS", "Homepage": "https://gobies.org/", "DisclosureDate": "2021-06-10", "Author": "gobysec@gmail.com", "GobyQuery": "body=\"icon-comma\"", "Level": "3", "Impact": "

Hackers can execute any command on the server and write the back door, so as to invade the server and obtain the administrator authority of the server.

", "Recommendation": "

Upgrade to the latest version.

", "References": [ "https://cn.gobies.org/" ], "HasExp": true, "ExpParams": [ { "name": "cmd", "type": "input", "value": "" } ], "ExpTips": { "Type": "", "Content": "" }, "ScanSteps": null, "ExploitSteps": null, "Tags": [ "RCE" ], "CVEIDs": null, "CVSSScore": "0.0", "AttackSurfaces": { "Application": null, "Support": null, "Service": null, "System": null, "Hardware": null } }