← Back to CVEs
CVE-2020-10567
CRITICAL9.8
Description
An issue was discovered in Responsive Filemanager through 9.14.0. In the ajax_calls.php file in the save_img action in the name parameter, there is no validation of what kind of extension is sent. This makes it possible to execute PHP code if a legitimate JPEG image contains this code in the EXIF data, and the .php extension is used in the name parameter. (A potential fast patch is to disable the save_img action in the config file.)
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/14/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
tecrail:responsive_filemanager
Weaknesses (CWE)
CWE-20
References
http://packetstormsecurity.com/files/171280/ZwiiCMS-12.2.04-Remote-Code-Execution.html(cve@mitre.org)
https://github.com/trippo/ResponsiveFilemanager/issues/600(cve@mitre.org)
http://packetstormsecurity.com/files/171280/ZwiiCMS-12.2.04-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/trippo/ResponsiveFilemanager/issues/600(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.