← Zuruck zu CVEs
CVE-2020-37113
HIGH8.8
Beschreibung
GUnet OpenEclass 1.7.3 allows authenticated users to bypass file extension restrictions when uploading files. By renaming a PHP file to .php3 or .PhP, an attacker can upload a web shell and execute arbitrary code on the server. This vulnerability enables remote code execution by bypassing the intended file type checks in the exercise submission feature.
CVE Details
CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht2/3/2026
Zuletzt geandert2/12/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
gunet:open_eclass_platform
Schwachen (CWE)
CWE-434
Referenzen
https://download.openeclass.org/files/docs/1.7/CHANGES.txt(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/48163(disclosure@vulncheck.com)
https://www.openeclass.org/(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/gunet-openeclass-e-learning-platform-file-upload-extension-bypass(disclosure@vulncheck.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.