8.8

CVE-2020-27387

Exploit
An unrestricted file upload issue in HorizontCMS through 1.0.0-beta allows an authenticated remote attacker (with access to the FileManager) to upload and execute arbitrary PHP code by uploading a PHP payload, and then using the FileManager's rename function to provide the payload (which will receive a random name on the server) with the PHP extension, and finally executing the PHP file via an HTTP GET request to /storage/<php_file_name>. NOTE: the vendor has patched this while leaving the version number at 1.0.0-beta.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Horizontcms ProjectHorizontcms Version1.0.0 Updatealpha
Horizontcms ProjectHorizontcms Version1.0.0 Updatealpha2
Horizontcms ProjectHorizontcms Version1.0.0 Updatealpha3
Horizontcms ProjectHorizontcms Version1.0.0 Updatealpha4
Horizontcms ProjectHorizontcms Version1.0.0 Updatealpha5
Horizontcms ProjectHorizontcms Version1.0.0 Updatealpha6
Horizontcms ProjectHorizontcms Version1.0.0 Updatealpha7
Horizontcms ProjectHorizontcms Version1.0.0 Updatealpha8
Horizontcms ProjectHorizontcms Version1.0.0 Updatebeta
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 70.32% 0.986
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.5 8 6.4
AV:N/AC:L/Au:S/C:P/I:P/A:P
CWE-434 Unrestricted Upload of File with Dangerous Type

The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.