Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-47943— TextPattern CMS 4.8.7 Remote Code Execution via File Upload

CVSS 8.8 · High
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-47943

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
TextPattern CMS 4.8.7 Remote Code Execution via File Upload
Source: NVD (National Vulnerability Database)
Vulnerability Description
TextPattern CMS 4.8.7 contains a remote code execution vulnerability that allows authenticated attackers to execute arbitrary commands by uploading malicious PHP files through the file upload functionality. Attackers can upload a PHP shell via the Files section in the content area and execute commands by accessing the uploaded file at /textpattern/files/ with GET parameters passed to the system function.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
危险类型文件的不加限制上传
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
TextpatternTextPattern CMS 4.8.7 -

II. Public POCs for CVE-2021-47943

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-47943

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2021-47943

No comments yet


Leave a comment