Phpfusion.py
: Move to the latest version of PHPFusion (e.g., 9.10.30 or newer), as older versions are notorious for unpatched security flaws.
: Use a Web Application Firewall (WAF) to block crafted POST parameters and directory traversal attempts. PHPFusion.py
: High. It allows unauthenticated or low-privileged users to execute commands in the security context of the web server. : Move to the latest version of PHPFusion (e
: It often includes a verification step to check for the existence of infusion_db.php or vulnerable endpoints like /infusions/downloads/downloads.php . It allows unauthenticated or low-privileged users to execute
: Ensure all 3rd-party addons (infusions) are reputable and updated, as they are common entry points for hackers. Home - Official Home of the PHPFusion CMS
: While this specific RCE script targets version 9.03.50, other notable PHPFusion vulnerabilities include CVE-2019-12099 (avatar upload RCE) and CVE-2023-2453 (authenticated Local File Inclusion). Defensive Recommendations
: The script encodes the malicious payload using Base64 .