Description
An unrestricted file upload issue in FlexDotnetCMS before v1.5.9 allows an authenticated remote attacker to upload and execute arbitrary files by using the FileManager to upload malicious code (e.g., ASP code) in the form of a safe file type (e.g., a TXT file), and then using the FileEditor (in v1.5.8 and prior) or the FileManager's rename function (in v1.5.7 and prior) to rename the file to an executable extension (e.g., ASP), and finally executing the file via an HTTP GET request to /<path_to_file>.
Published: 2020-11-12
Score: 8.8 High
EPSS: 77.9% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Flexdotnetcms Project Flexdotnetcms
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T16:11:36.668Z

Reserved: 2020-10-21T00:00:00.000Z

Link: CVE-2020-27386

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-11-12T19:15:15.207

Modified: 2024-11-21T05:21:08.363

Link: CVE-2020-27386

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses