提出 #798529: https://github.com/GreenCMS/GreenCMS GreenCMS v2.3 arbitrary file deletion情報

タイトルhttps://github.com/GreenCMS/GreenCMS GreenCMS v2.3 arbitrary file deletion
説明The /CustomController.class.php file in greencms v2.3 contains a file upload vulnerability. This flaw arises from the pluginAddLocal method's failure to validate uploaded files. Attackers can access the /index.php?m=admin&c=custom&a=pluginadd page to upload compressed files containing webshells. The system automatically decompresses these files into the website's root directory, allowing malicious files to be implanted. Using tools like Godzilla, attackers can exploit the implanted webshell to connect to target servers, gain control, and cause severe security risks such as data breaches and server tampering.
ソース⚠️ https://github.com/ueh1013/VULN/issues/7
ユーザー
 R21Z20 (UID 97129)
送信2026年04月07日 05:49 (21 日 ago)
モデレーション2026年04月25日 18:01 (19 days later)
ステータス承諾済み
VulDBエントリ359622 [GreenCMS 迄 2.3 index.php?m=admin&c=custom&a=pluginadd pluginAddLocal 特権昇格]
ポイント20

Do you know our Splunk app?

Download it now for free!