An unrestricted file upload issue in HorizontCMS through 1.0.0-beta allows an authenticated remote attacker (with access to the FileManager) to upload and execute arbitrary PHP code by uploading a PHP payload, and then using the FileManager's rename function to provide the payload (which will receive a random name on the server) with the PHP extension, and finally executing the PHP file via an HTTP GET request to /storage/<php_file_name>. NOTE: the vendor has patched this while leaving the version number at 1.0.0-beta.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T16:11:36.590Z

Reserved: 2020-10-21T00:00:00

Link: CVE-2020-27387

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-11-05T02:15:12.067

Modified: 2024-11-21T05:21:08.603

Link: CVE-2020-27387

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses