Risk | Medium |
Patch available | NO |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2018-18936 CVE-2018-18935 CVE-2018-18934 CVE-2019-9549 |
CWE-ID | CWE-22 CWE-352 CWE-434 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #2 is available. Public exploit code for vulnerability #3 is available. |
Vulnerable software Subscribe |
PopojiCMS Web applications / Modules and components for CMS |
Vendor | PopojiCMS |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU17896
Risk: Medium
CVSSv3.1: 4.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L/E:U/RL:U/RC:C]
CVE-ID: CVE-2018-18936
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences within admin_library.php when processing data passed via the "id" parameter to "po-admin/route.php?mod=library&act=delete" URI. A remote administrator can send a specially crafted HTTP request and delete arbitrary files on the system.
Note, this vulnerability can be exploited via CSRF.
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsPopojiCMS: 2.0.1
External linkshttp://github.com/PopojiCMS/PopojiCMS/issues/15
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17895
Risk: Medium
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:U/RC:C]
CVE-ID: CVE-2018-18935
CWE-ID:
CWE-352 - Cross-Site Request Forgery (CSRF)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin in the "po-admin/route.php?mod=component&act=addnew" URI. A remote attacker can trick the victim to visit a specially specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website, such as adding a level=1 account.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsPopojiCMS: 2.0.1
External linkshttp://github.com/PopojiCMS/PopojiCMS/issues/14
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU17894
Risk: Medium
CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C]
CVE-ID: CVE-2018-18934
CWE-ID:
CWE-434 - Unrestricted Upload of File with Dangerous Type
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to upload dangerous files to the system.
The vulnerability exists due to insufficient validation of the uploaded files passed via the "fupload" parameter to "po-admin/route.php?mod=component&act=addnew" URI. A remote authenticated administrator can upload a .zip archive with .php file inside and execute it with privileges of the web server.
Note, this vulnerability can be exploited via CSRF attack.
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsPopojiCMS: 2.0.1
External linkshttp://github.com/PopojiCMS/PopojiCMS/issues/12
http://github.com/PopojiCMS/PopojiCMS/issues/13
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU17893
Risk: Medium
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N/E:U/RL:U/RC:C]
CVE-ID: CVE-2019-9549
CWE-ID:
CWE-352 - Cross-Site Request Forgery (CSRF)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin in the po-admin/route.php?mod=user&act=addnew URI. A remote attacker can trick the victim to visit a specially specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website, such as adding a level=1 account.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsPopojiCMS: 2.0.1
External linkshttp://github.com/PopojiCMS/PopojiCMS/issues/17
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.