An issue found in ProcessWire 3.0.210 allows attackers to execute arbitrary code and install a reverse shell via the download_zip_url parameter when installing a new module. NOTE: this is disputed because exploitation requires that the attacker is able to enter requests as an admin; however, a ProcessWire admin is intentionally allowed to install any module that contains any arbitrary code.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T11:03:18.818Z

Reserved: 2023-01-30T00:00:00

Link: CVE-2023-24676

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2024-01-24T21:15:08.327

Modified: 2024-11-21T07:48:17.970

Link: CVE-2023-24676

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.