← Voltar para CVEs
CVE-2020-37113
HIGH8.8
Descricao
GUnet OpenEclass 1.7.3 allows authenticated users to bypass file extension restrictions when uploading files. By renaming a PHP file to .php3 or .PhP, an attacker can upload a web shell and execute arbitrary code on the server. This vulnerability enables remote code execution by bypassing the intended file type checks in the exercise submission feature.
Detalhes CVE
Pontuacao CVSS v3.18.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado2/3/2026
Ultima modificacao2/12/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
gunet:open_eclass_platform
Fraquezas (CWE)
CWE-434
Referencias
https://download.openeclass.org/files/docs/1.7/CHANGES.txt(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/48163(disclosure@vulncheck.com)
https://www.openeclass.org/(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/gunet-openeclass-e-learning-platform-file-upload-extension-bypass(disclosure@vulncheck.com)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.