4 results (0.002 seconds)

CVSS: 7.2EPSS: 3%CPEs: 1EXPL: 2

SOY CMS 3.0.2 and earlier is affected by Remote Code Execution (RCE) using Unrestricted File Upload. Cross-Site Scripting(XSS) vulnerability that was used in CVE-2020-15183 can be used to increase impact by redirecting the administrator to access a specially crafted page. This vulnerability is caused by insecure configuration in elFinder. This is fixed in version 3.0.2.328. SOY CMS versiones 3.0.2 y anteriores, están afectadas por una Ejecución de Código Remota (RCE) usando una Carga de Archivos Sin Restricciones. • https://github.com/inunosinsi/soycms/issues/9 https://github.com/inunosinsi/soycms/pull/14 https://github.com/inunosinsi/soycms/pull/14/commits/e4ef00677ed52f9e5a5fcfcb56b797f5412b5d59 https://github.com/inunosinsi/soycms/security/advisories/GHSA-6r2f-p68g-m433 https://youtu.be/FWIDFNXmr9g • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 10.0EPSS: 9%CPEs: 1EXPL: 3

SOY CMS 3.0.2.327 and earlier is affected by Unauthenticated Remote Code Execution (RCE). The allows remote attackers to execute any arbitrary code when the inquiry form feature is enabled by the service. The vulnerability is caused by unserializing the form without any restrictions. This was fixed in 3.0.2.328. SOY CMS versiones 3.0.2.327 y anteriores, están afectadas por una Ejecución de Código Remota (RCE) No Autenticado. • https://github.com/inunosinsi/soycms/issues/10 https://github.com/inunosinsi/soycms/pull/12/commits/a75642989132dd25f74a13194b27c0986c3de020 https://github.com/inunosinsi/soycms/security/advisories/GHSA-hrrx-m22r-p9jp https://www.youtube.com/watch?v=zAE4Swjc-GU&feature=youtu.be • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.6EPSS: 1%CPEs: 2EXPL: 1

The SOY Inquiry component of SOY CMS is affected by Cross-site Request Forgery (CSRF) and Remote Code Execution (RCE). The vulnerability affects versions 2.0.0.3 and earlier of SOY Inquiry. This allows remote attackers to force the administrator to edit files once the administrator loads a specially crafted webpage. An administrator must be logged in for exploitation to be possible. This issue is fixed in SOY Inquiry version 2.0.0.4 and included in SOY CMS 3.0.2.328. • https://github.com/inunosinsi/soycms/pull/15 https://github.com/inunosinsi/soycms/security/advisories/GHSA-j2qw-747j-mfv4 https://youtu.be/ffvKH3gwyRE • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

SOY CMS v3.0.2 allows remote attackers to execute arbitrary PHP code via a <?php substring in the second text box. NOTE: the vendor indicates that there was an assumption that the content is "made editable on its own. ** EN DISPUTA ** CMS SOY, versión 3.0.2, permite a los atacantes remotos ejecutar código PHP arbitrario a través de una subcadena en el segundo cuadro de texto • http://www.iwantacve.cn/index.php/archives/212 https://github.com/inunosinsi/soycms/issues/5 • CWE-94: Improper Control of Generation of Code ('Code Injection') •