Cockpit CMS 0.6.1 - Remote Code Execution

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

23 days 11 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

Cockpit before 0.6.1 allows an attacker to inject custom PHP code and achieve Remote Command Execution via registerCriteriaFunction in lib/MongoLite/Database.php, as demonstrated by values in JSON data to the /auth/check or /auth/requestreset URI.


References:
Get started to protecting your digital assets