diff --git a/cnvd/2019/CNVD-2019-06255.yaml b/cnvd/2019/CNVD-2019-06255.yaml index ed1412b819..16cc2d89c0 100644 --- a/cnvd/2019/CNVD-2019-06255.yaml +++ b/cnvd/2019/CNVD-2019-06255.yaml @@ -3,9 +3,16 @@ id: CNVD-2019-06255 info: name: CatfishCMS RCE author: Lark-Lab - severity: medium - reference: http://112.124.31.29/%E6%BC%8F%E6%B4%9E%E5%BA%93/01-CMS%E6%BC%8F%E6%B4%9E/CatfishCMS/CNVD-2019-06255%20CatfishCMS%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C/ + severity: Critical + description: CatfishCMS 4.8.54 contains a remote command execution vulnerability in the "method" parameter. + remediation: Upgrade to CatfishCMS version 4.8.54 or later. + reference: + - https://its401.com/article/yun2diao/91344725 + - https://github.com/xwlrbh/Catfish/issues/4 tags: rce,cnvd,catfishcms,cnvd2019 + cvss-metrics: + cvss-score: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cwe-id: CWE-77 requests: - method: GET @@ -25,3 +32,5 @@ requests: - 'SHELL' - 'USER' condition: and + +# Enhanced by cs on 2022/02/28