CMS Made Simple (CMSMS) through 2.2.7 contains an arbitrary code execution vulnerability in the admin dashboard because the implementation uses "eval('function testfunction'.rand()" and it is possible to bypass certain restrictions on these "testfunction" functions.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/itodaro/cve/blob/master/README.md | Exploit Technical Description Third Party Advisory | 
| https://github.com/itodaro/cve/blob/master/README.md | Exploit Technical Description Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 03:40
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/itodaro/cve/blob/master/README.md - Exploit, Technical Description, Third Party Advisory | 
Information
                Published : 2018-04-13 05:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-10086
Mitre link : CVE-2018-10086
CVE.ORG link : CVE-2018-10086
JSON object : View
Products Affected
                cmsmadesimple
- cms_made_simple
CWE
                
                    
                        
                        CWE-94
                        
            Improper Control of Generation of Code ('Code Injection')
