[原文]Fusion News 3.6.1 allows remote attackers to add user accounts, if the administrator is logged in, via a comment that contains an img bbcode tag that calls index.php with the signup action, which is executed when the administrator's browser loads the page with the img tag.
It is reported that Fusion News is affected by an administrator command execution vulnerability. This issue is due to a failure of the application to properly validate access to administrative commands.
This issue permits a remote attacker to create a malicious URI link or embed a malicious URI between bbCode image tags, which includes hostile HTML and script code. If an unsuspecting forum administrator activates this URI, the attacker-supplied command would be carried out with the administrator's privileges. This occurs in the security context of the affected web site and would cause various administrator actions to be taken.
Version 3.6.1 and prior are reported to be affected by this vulnerability.
FusionPHP Fusion News Img Tag Arbitrary Command Execution
Remote / Network Access
Loss of Confidentiality,
Loss of Integrity,
Loss of Availability
FusionPHP Fusion News contains a flaw that may allow a malicious user to execute abitrary commands by embedding a specially crafted BBCode image tag URL into a comment. The issue is triggered when an administrator views the comment while logged in. It is possible that the flaw may allow the creation of user accounts resulting in a loss of confidentiality, integrity, and/or availability.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.