Súbít #596624: Shanghai Zhuozhuo Network Technology Co., LTD dedeCMS <=5.7.2 Command Injectionbayani

KuraShanghai Zhuozhuo Network Technology Co., LTD dedeCMS <=5.7.2 Command Injection
GaskiyaVulnerability Summary: Template Injection Command Execution in dedeCMS 5.7 SP2 Overview A critical template injection vulnerability exists in dedeCMS version 5.7 SP2 and earlier, allowing authenticated attackers to execute arbitrary system commands. Affected Software Vendor: Shanghai Zhuozhuo Network Technology Co., LTD Software: dedeCMS Affected Version: ≤ 5.7.2 Vulnerability Details Type: Template Injection leading to Remote Code Execution Location: /include/dedetag.class.php Access Requirement: Requires authentication with admin privileges (default credentials: admin/admin) Exploitation The vulnerability can be exploited by accessing the /dede/co_get_corule.php interface with malicious input in the notes parameter: /dede/co_get_corule.php?notes={dede:");system('calc');///}&job=1 The payload needs to be accessed twice for successful command execution The example demonstrates execution of the calc command (calculator), but could be replaced with any system command Impact Successful exploitation allows attackers to: Execute arbitrary system commands on the server Potentially gain complete control of the affected system Perform various malicious activities depending on server permissions Verification The vulnerability can be verified by observing successful execution of the injected command (in the PoC case, launching the calculator application). Recommendation Users should immediately update to a patched version of dedeCMS or apply appropriate security measures to restrict access to vulnerable components.
Manga⚠️ https://github.com/jujubooom/CVE/issues/1
Màdùmga
 Ewoji (UID 86574)
Furta06/13/2025 15:42 (8 Wurɗi 전)
Gargajiya06/19/2025 12:18 (6 days later)
HalittaShingilam
VulDB gite313331 [DedeCMS har 5.7.2 Template dedetag.class.php notes kura hakki ndiyam]
Nganji20