HTTP: SkyBlueCanvas CMS Remote Command Execution

This signature detects attempts to exploit a known vulnerability against SkyBlueCanvas CMS. A successful attack can lead to command injection and arbitrary code execution.

Extended Description

The bashMail function in cms/data/skins/techjunkie/fragments/contacts/functions.php in SkyBlueCanvas CMS before 1.1 r248-04, when the pid parameter is 4, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) name, (2) email, (3) subject, or (4) message parameter to index.php.

Affected Products

Skybluecanvas skybluecanvas

References

BugTraq: 65129

CVE: CVE-2014-1683

Short Name
HTTP:SQL:INJ:SKYBLUE-CANVAS-CE
Severity
Minor
Recommended
True
Recommended Action
None
Category
HTTP
Keywords
CMS CVE-2014-1683 Command Execution Remote SkyBlueCanvas bid:65129
Release Date
01/19/2024
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3671
False Positive
Unknown
Vendors

Skybluecanvas

Found a potential security threat?