Blue River Mura CMS before v7.0.7029 supports inline function calls with an [m] tag and [/m] end tag, without proper restrictions on file types or pathnames, which allows remote attackers to execute arbitrary code via an [m]$.dspinclude("../pathname/executable.jpeg")[/m] approach, where executable.jpeg contains ColdFusion Markup Language code. This can be exploited in conjunction with a CKFinder feature that allows file upload.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-19217 Blue River Mura CMS before v7.0.7029 supports inline function calls with an [m] tag and [/m] end tag, without proper restrictions on file types or pathnames, which allows remote attackers to execute arbitrary code via an [m]$.dspinclude("../pathname/executable.jpeg")[/m] approach, where executable.jpeg contains ColdFusion Markup Language code. This can be exploited in conjunction with a CKFinder feature that allows file upload.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T06:31:03.602Z

Reserved: 2018-02-26T00:00:00

Link: CVE-2018-7486

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-02-26T14:29:00.447

Modified: 2024-11-21T04:12:13.380

Link: CVE-2018-7486

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses