7.2
CVE-2022-23048
- EPSS 4.58%
- Veröffentlicht 09.02.2022 23:15:19
- Zuletzt bearbeitet 21.11.2024 06:47:52
- Quelle help@fluidattacks.com
- CVE-Watchlists
- Unerledigt
Exponent CMS 2.6.0patch2 allows an authenticated admin user to upload a malicious extension in the format of a ZIP file with a PHP file inside it. After upload it, the PHP file will be placed at "themes/simpletheme/{rce}.php" from where can be accessed in order to execute commands.Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Exponentcms ≫ Exponent Cms Version2.6.0 Updatepatch2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 4.58% | 0.887 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.