CNVD-2018-01089 Scanner
CNVD-2018-01089 Scanner - Remote Code Execution (RCE) vulnerability in Maccms
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
24 days 6 hours
Scan only one
URL
Toolbox
-
Maccms is a cross-platform rapid website building system based on PHP and MySQL, widely used by developers for creating video-on-demand websites. It is popular among small to medium-sized businesses for its versatility and open-source nature. With its extensive plugin ecosystem, Maccms allows users to extend its functionality with minimal effort. Web developers favor Maccms due to its ease of use, adaptability, and robust performance. Regular updates and community support have contributed to its widespread adoption. Despite its advantages, vulnerabilities in older versions pose significant security risks.
This scanner detects a Remote Code Execution (RCE) vulnerability in Maccms 8.x. RCE vulnerabilities allow attackers to execute arbitrary code on the host machine, potentially compromising the entire system. By exploiting the 'wd' parameter in index.php?m=vod-search requests, attackers can execute commands remotely. Such vulnerabilities are critical as they enable unauthorized access and control over affected systems. Detecting and patching these vulnerabilities promptly is crucial to maintain system security.
The vulnerability lies in the 'wd' parameter of the Maccms 8.x version in index.php?m=vod-search requests. When exploited, attackers can input arbitrary code, which the server executes, leading to potential system takeover. The scanner identifies the presence of this vulnerability by checking for an injected random string and a status code of 200. This method confirms the vulnerability without executing harmful commands. The simplicity of the exploit highlights the need for careful parameter validation and input sanitization in web applications.
If exploited, this vulnerability can lead to unauthorized remote command execution, jeopardizing system integrity and confidentiality. Attackers can gain full access to the affected system, allowing data theft, system manipulation, and further attacks within the network. The impact can include service disruptions, data breaches, and loss of customer trust. Preventive measures are essential to safeguard sensitive information and business operations from malicious activities.
REFERENCES