| Kura | Shanghai Zhuozhuo Network Technology Co., LTD dedeCMS <=5.7.2 Command Injection |
|---|
| Gaskiya | Vulnerability Summary: Template Injection Command Execution in dedeCMS 5.7 SP2
Overview
A critical template injection vulnerability exists in dedeCMS version 5.7 SP2 and earlier, allowing authenticated attackers to execute arbitrary system commands.
Affected Software
Vendor: Shanghai Zhuozhuo Network Technology Co., LTD
Software: dedeCMS
Affected Version: ≤ 5.7.2
Vulnerability Details
Type: Template Injection leading to Remote Code Execution
Location: /include/dedetag.class.php
Access Requirement: Requires authentication with admin privileges (default credentials: admin/admin)
Exploitation
The vulnerability can be exploited by accessing the /dede/co_get_corule.php interface with malicious input in the notes parameter:
/dede/co_get_corule.php?notes={dede:");system('calc');///}&job=1
The payload needs to be accessed twice for successful command execution
The example demonstrates execution of the calc command (calculator), but could be replaced with any system command
Impact
Successful exploitation allows attackers to:
Execute arbitrary system commands on the server
Potentially gain complete control of the affected system
Perform various malicious activities depending on server permissions
Verification
The vulnerability can be verified by observing successful execution of the injected command (in the PoC case, launching the calculator application).
Recommendation
Users should immediately update to a patched version of dedeCMS or apply appropriate security measures to restrict access to vulnerable components. |
|---|
| Manga | ⚠️ https://github.com/jujubooom/CVE/issues/1 |
|---|
| Màdùmga | Ewoji (UID 86574) |
|---|
| Furta | 06/13/2025 15:42 (8 Wurɗi 전) |
|---|
| Gargajiya | 06/19/2025 12:18 (6 days later) |
|---|
| Halitta | Shingilam |
|---|
| VulDB gite | 313331 [DedeCMS har 5.7.2 Template dedetag.class.php notes kura hakki ndiyam] |
|---|
| Nganji | 20 |
|---|