An unrestricted file upload issue in HorizontCMS through 1.0.0-beta allows an authenticated remote attacker (with access to the FileManager) to upload and execute arbitrary PHP code by uploading a PHP payload, and then using the FileManager's rename function to provide the payload (which will receive a random name on the server) with the PHP extension, and finally executing the PHP file via an HTTP GET request to /storage/<php_file_name>. NOTE: the vendor has patched this while leaving the version number at 1.0.0-beta.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-11-05 02:15
Updated : 2020-11-13 18:15
NVD link : CVE-2020-27387
Mitre link : CVE-2020-27387
JSON object : View
Products Affected
horizontcms_project
- horizontcms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
