CMS >= 4.0.0-RC1 Craft CMS <= 4.4.14 0x04 漏洞详情 CVE-2023-41892.yaml id: CVE-2023-41892 info: name: CraftCMS reference: - https://github.com/craftcms/cms/security/advisories/GHSA-4w8r-3xrw-v25g - https: //blog.calif.io/p/craftcms-rce - https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#4415-- - https://github.com/craftcms/cms/commit/a270b928f3d34ad3bd953b81c304424edd57355e classification " shodan-query: http.favicon.hash:-47932290 tags: cve,cve2023,rce,unauth,craftcms http: - raw
/usr/bin/env python3 """ CraftCMS CVE-2025-32432 Remote Code Execution Exploit By Chirag Artani This script automates the exploitation of the pre-auth RCE vulnerability in CraftCMS 4.x and 5.x. Usage: Single target: python3 craftcms_rce.py -u example.com Multiple targets: python3 craftcms_rce.py -f urls.txt -t 10 """ import argparse import concurrent.futures import re import vulnerable': False, 'error': str(e)} def main(): parser = argparse.ArgumentParser(description='CraftCMS
影响版本 4.0.0-RC1 <= Craft CMS <= 4.4.14 0x04 环境搭建 前置步骤:安装好phpstudy后,下好php8+的版本,mysql5.7.8+的版本,再去重新安装craftcms 后面直接在php.ini文件中加入extension=php_intl.dll 再次重启,环境搭建完毕 0x05 漏洞分析复现 官网公告 https://github.com/craftcms/cms ::beforeAction($action); return true; } /** 漏洞位置 由于不知道具体含义,多点几个断点进行跟踪 执行POC POST /CraftCMS > 成功创建文件,这边是windows执行的,可能有点报错没写入 0x06 修复方式 升级版本 https://github.com/craftcms/cms/security/advisories /blog.csdn.net/df981011512/article/details/89678763 http://www.bmth666.cn/2023/09/26/CVE-2023-41892-CraftCMS
no-referrer-when-downgrade Content-Length: 15 0x05 参考链接 https://github.com/Chocapikk/CVE-2024-56145 https://github.com/craftcms
虽然这些框架适用于实际开发,但如果只需要进行内容管理,WordPress和CraftCMS是更好的选择,而且它们也会进一步改进。
https://github.com/craftcms/cms/releases 2. 临时缓解方案: - 安装临时缓解补丁: https://github.com/craftcms/security-patches 注意:该补丁只起缓解作用,建议升级到安全版本。
商业工具Acunetixv25.5.0则强化了漏洞检测覆盖面,可识别包括CVE-2025-32432(CraftCMS远程代码执行)在内的最新威胁,并支持LDAP注入、PII信息泄露等业务逻辑漏洞的自动化扫描