BoidCMS v2.0.0-authenticated-file-upload-RCE
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户提供的文章是关于BoidCMS v2.0.0的一个RCE漏洞,CVE编号是2023-38836。 首先,我得通读整篇文章,抓住关键点。文章提到这是一个零日漏洞,利用了管理面板中的文件上传验证不安全,导致未经身份验证的RCE。攻击者需要有管理员权限,但通常使用默认凭证。漏洞评分很高,CVSS 9.8,属于严重级别。 接下来,技术指标部分提到了文件系统、网络和进程的异常指标。比如上传的shell.php文件,POST请求到特定页面,以及执行系统命令的PHP进程等。 然后是演示链接和联系方式部分,这些可能不需要包含在总结中。 现在我要把这些信息浓缩到100字以内。重点包括:BoidCMS v2.0.0的RCE漏洞(CVE-2023-38836),通过不安全的文件上传实现,需要管理员权限,默认凭证可能被利用,CVSS评分高。可能还要提到攻击链导致服务器完全控制。 最后检查字数是否符合要求,并确保语言简洁明了。 </think> BoidCMS v2.0.0 存在严重 RCE 漏洞(CVE-2023-38836),利用管理面板文件上传验证不安全实现未认证 RCE,需管理员权限,默认凭证易被利用。CVSS 9.8 分级。 2026-2-2 21:11:26 Author: cxsecurity.com(查看原文) 阅读量:1 收藏

# Title: BoidCMS v2.0.0-authenticated-file-upload-RCE # Author: nu11secur1ty # Date: 2026-01-29 # Vendor: BoidCMS # Software: BoidCMS v2.0.0 | https://github.com/BoidCMS/BoidCMS | https://boidcms.github.io/BoidCMS.zip # Reference: CVE-2023-38836 ### Vulnerability Description: CVE-2023-38836 is a critical Remote Code Execution (RCE) vulnerability affecting BoidCMS v2.0.0. This zero-day exploit leverages insecure file upload validation in the admin panel to achieve unauthenticated RCE via authenticated admin access. The vulnerability demonstrates a chain of security failures culminating in complete server compromise. ### Technical Specifications - CVE ID: CVE-2023-38836 - CVSS Score: 9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Admin Credentials (Often Default) - User Interaction: None - Impact: Complete system compromise ### Technical Indicators of Compromise (IOCs) File System Artifacts: /media/shell.php (GIF-PHP polyglot) /uploads/shell.php (Alternative location) /tmp/ directory with suspicious PHP files Network Indicators: POST requests to /admin?page=media File uploads with mismatched Content-Type GET requests to .php files with ?cmd= parameters Process Indicators: Unusual PHP processes executing system commands Network connections from web server to external IPs Increased CPU/memory usage on web server ### Demo [url]:(https://www.patreon.com/posts/boidcms-v2-0-0-149602427) ### Buy me a coffee: [url]:(https://venvar.gumroad.com/l/imjyj) -- System Administrator - Infrastructure Engineer Penetration Testing Engineer Exploit developer at https://packetstormsecurity.com/ https://cve.mitre.org/index.html https://cxsecurity.com/ and https://www.exploit-db.com/ home page: https://www.asc3t1c-nu11secur1ty.com/ hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E= nu11secur1ty <https://www.asc3t1c-nu11secur1ty.com/>


文章来源: https://cxsecurity.com/issue/WLB-2026020002
如有侵权请联系:admin#unsafe.sh