Learn about CVE-2017-14764 affecting GeniXCMS 1.1.4, allowing remote authenticated users to execute arbitrary PHP code via a .php file in a ZIP archive. Find mitigation steps and prevention measures.
GeniXCMS 1.1.4 allows remote authenticated users to execute arbitrary PHP code via a .php file in a ZIP archive of a module.
Understanding CVE-2017-14764
This CVE entry describes a vulnerability in GeniXCMS 1.1.4 that enables authenticated remote users to run arbitrary PHP code.
What is CVE-2017-14764?
In GeniXCMS 1.1.4, users with remote authentication can upload a module containing a .php file within a ZIP archive, allowing them to execute arbitrary PHP code.
The Impact of CVE-2017-14764
This vulnerability poses a significant security risk as it allows unauthorized code execution, potentially leading to system compromise and data breaches.
Technical Details of CVE-2017-14764
GeniXCMS 1.1.4 vulnerability details.
Vulnerability Description
Users authenticated remotely can upload a module with a .php file in a ZIP archive, enabling the execution of arbitrary PHP code.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability is exploited by including a .php file within a ZIP archive of a module on the Upload Modules page of GeniXCMS 1.1.4.
Mitigation and Prevention
Protect your system from CVE-2017-14764.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates