Cockpit CMS 0.13.0 - Remote Code Execution
Overview #
Multiple Remote Code Execution (RCE) vulnerabilities exist in Cockpit CMS version 0.13.0. The vulnerabilities allow remote attackers to execute arbitrary PHP code on the server.
Vulnerability Details #
Affected Versions: 0.13.0 and earlier
Location: Multiple endpoints including /accounts/save, /auth/check, /api/galleries/findOne, /api/collections/findOne
Affected Parameters: account._id, auth[user], filter._id
Root Cause: The vulnerability exists due to improper handling of user input in JSON parameters, allowing PHP code evaluation.
Exploitation Requirements #
- No authentication required for some vectors
- Direct access to vulnerable endpoints
Impact #
Remote attackers can exploit these vulnerabilities to:
- Execute arbitrary PHP code on the server
- Gain complete control of the CMS
- Access sensitive files and databases
- Pivot to internal network resources
Proof of Concept #
POST /cockpit-0.13.0/accounts/save HTTP/1.1
Host: target.com
Content-Type: application/json
{"account":{"_id":"'+print(int)0xFFF9999-22+'"}}
POST /cockpit-0.13.0/auth/check HTTP/1.1
Host: target.com
Content-Type: application/x-www-form-urlencoded
auth[user]='+print(int)0xFFF9999-22+'
Solution #
Upgrade to a patched version of Cockpit CMS that includes proper input sanitization.