Monstra CMS 3.0.4 allows an attacker, who already has administrative access to modify .chunk.php files on the Edit Chunk screen, to execute arbitrary OS commands via the Theme Module by visiting the admin/index.php?id=themes&action=edit_chunk URI. NOTE: there is no indication that the Edit Chunk feature was intended to prevent an administrator from using PHP's exec feature
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/monstra-cms/monstra/issues/464 |
![]() ![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-27T19:49:00.656Z
Reserved: 2020-06-09T00:00:00
Link: CVE-2020-13978

Updated: 2024-08-04T12:32:14.683Z

Status : Modified
Published: 2020-06-09T14:15:10.140
Modified: 2024-11-21T05:02:16.957
Link: CVE-2020-13978

No data.