BoidCMS v1.0.1-authenticated-file-upload-RCE
好的,用户让我帮忙总结一篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,抓住关键点。 文章标题是BoidCMS v1.0.1的认证文件上传远程代码执行漏洞。作者是nu11secur1ty,日期是2026年2月5日。漏洞描述中提到这是一个零日漏洞,利用管理面板中的不安全文件上传验证机制,通过认证的管理员访问实现未认证的RCE。CVSS评分是9.8,属于严重级别。 技术细节包括攻击向量、复杂度、权限等。还有IOCs部分,涉及文件系统、网络和进程指标。此外,提到了一个演示利用链接和购买咖啡的链接。 总结时要突出漏洞的严重性、影响范围以及关键的技术点。控制在100字以内,直接描述内容即可。 </think> BoidCMS v1.0.1 存在严重远程代码执行漏洞,攻击者通过管理面板文件上传功能实现未认证远程代码执行,CVSS 评分 9.8 分。该漏洞利用服务器完全控制权获取,并伴随异常 PHP 进程和网络连接等行为特征。 2026-2-5 21:44:33 Author: cxsecurity.com(查看原文) 阅读量:1 收藏

# Title: BoidCMS v1.0.1-authenticated-file-upload-RCE # Author: nu11secur1ty # Date: 02/05/2026 # Vendor: BoidCMS # Software: https://github.com/BoidCMS/BoidCMS/releases/tag/v1.0.1 ### Vulnerability Description: The BoidCMS v1.0.1 CMS is suffers from critical Remote Code Execution (RCE) vulnerability affecting BoidCMS v1.0.1. This zero-day exploit leverages insecure file upload validation in the admin panel to achieve unauthenticated RCE via authenticated admin access. The vulnerability demonstrates a chain of security failures culminating in complete server compromise. ### Technical Specifications - CVSS Score: 9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Admin Credentials (Often Default) - User Interaction: None - Impact: Complete system compromise ### Technical Indicators of Compromise (IOCs) File System Artifacts: /media/shell.php (GIF-PHP polyglot) /uploads/shell.php (Alternative location) /tmp/ directory with suspicious PHP files Network Indicators: POST requests to /admin?page=media File uploads with mismatched Content-Type GET requests to .php files with ?cmd= parameters Process Indicators: Unusual PHP processes executing system commands Network connections from web server to external IPs Increased CPU/memory usage on web server ### The demo exploit for 2.0.0 is same as...1.0.1 [url]:(https://www.patreon.com/posts/boidcms-v2-0-0-149602427) ### Buy me a coffee: [url]:(https://venvar.gumroad.com/l/imjyj) -- System Administrator - Infrastructure Engineer Penetration Testing Engineer Exploit developer at https://packetstormsecurity.com/ https://cve.mitre.org/index.html https://cxsecurity.com/ and https://www.exploit-db.com/ home page: https://www.asc3t1c-nu11secur1ty.com/ hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E= nu11secur1ty <https://www.asc3t1c-nu11secur1ty.com/>


文章来源: https://cxsecurity.com/issue/WLB-2026020009
如有侵权请联系:admin#unsafe.sh