CNVD-2018-01089 Scanner

CNVD-2018-01089 Scanner - Remote Code Execution (RCE) vulnerability in Maccms

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

24 days 6 hours

Scan only one

URL

Toolbox

-

Maccms is a cross-platform rapid website building system based on PHP and MySQL, widely used by developers for creating video-on-demand websites. It is popular among small to medium-sized businesses for its versatility and open-source nature. With its extensive plugin ecosystem, Maccms allows users to extend its functionality with minimal effort. Web developers favor Maccms due to its ease of use, adaptability, and robust performance. Regular updates and community support have contributed to its widespread adoption. Despite its advantages, vulnerabilities in older versions pose significant security risks.

This scanner detects a Remote Code Execution (RCE) vulnerability in Maccms 8.x. RCE vulnerabilities allow attackers to execute arbitrary code on the host machine, potentially compromising the entire system. By exploiting the 'wd' parameter in index.php?m=vod-search requests, attackers can execute commands remotely. Such vulnerabilities are critical as they enable unauthorized access and control over affected systems. Detecting and patching these vulnerabilities promptly is crucial to maintain system security.

The vulnerability lies in the 'wd' parameter of the Maccms 8.x version in index.php?m=vod-search requests. When exploited, attackers can input arbitrary code, which the server executes, leading to potential system takeover. The scanner identifies the presence of this vulnerability by checking for an injected random string and a status code of 200. This method confirms the vulnerability without executing harmful commands. The simplicity of the exploit highlights the need for careful parameter validation and input sanitization in web applications.

If exploited, this vulnerability can lead to unauthorized remote command execution, jeopardizing system integrity and confidentiality. Attackers can gain full access to the affected system, allowing data theft, system manipulation, and further attacks within the network. The impact can include service disruptions, data breaches, and loss of customer trust. Preventive measures are essential to safeguard sensitive information and business operations from malicious activities.

REFERENCES

Get started to protecting your digital assets