Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Seven bugs.

Seven bugs.

Scheduled Pinned Locked Moved Uncategorized
offensivesecurivulnerabilityrepentestinginfosec
1 Posts 1 Posters 2 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • pentesttools@infosec.exchangeP This user is from outside of this forum
    pentesttools@infosec.exchangeP This user is from outside of this forum
    pentesttools@infosec.exchange
    wrote last edited by
    #1

    Seven bugs. One unauthenticated RCE chain. Zero clicks.

    This original research by our offensive security team into FuelCMS (v1.5.2) uncovered seven new vulnerabilities. By chaining some of them, we achieved Remote Code Execution (RCE).

    The root causes? A *12-year-old Dwoo templating engine* and *outdated CodeIgniter3 code* still lurking in production systems.

    The exploit chain combines:

    πŸ”“ Account takeover (PTT-2025-025): reset password tokens leaked by sending them to the attacker's inbox

    πŸ’‰ SQL injection (PTT-2025-030): usernames extracted during password reset (optional step)

    ⚑ PHP code execution (PTT-2025-026): unsanitized backslashes in the Dwoo parser resulting in RAW PHP CODE EXECUTION

    Result: full web app compromise.

    We published the full exploit chain on our blogpost so practitioners can reproduce and validate the findings. Read the detailed research here: https://pentest-tools.com/blog/throwing-a-spark-in-fuelcms

    Many thanks to Matei Badanoiu, Raul Bledea and Eusebiu Boghici for their contributions.

    #offensivesecurity #vulnerabilityresearch #pentesting #infosec

    Out of curiosity: how often do you still run into 10+ year-old libraries during engagements?

    Link Preview Image
    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups