Page 5 of 44 results (0.002 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Cross Site Request Forgery (CSRF) in Pluck CMS v4.7.9 allows remote attackers to execute arbitrary code and delete a specific article via the component " /admin.php?action=page." Una vulnerabilidad de tipo Cross Site Request Forgery (CSRF) en Pluck CMS versión v4.7.9, permite a atacantes remotos ejecutar código arbitrario y eliminar un artículo específico por medio del componente "/admin.php?action=page" • https://github.com/pluck-cms/pluck/issues/69 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.2EPSS: 3%CPEs: 1EXPL: 6

A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution. Una vulnerabilidad de omisión de restricción de carga de archivos en Pluck CMS versiones anteriores a 4.7.13, permite a un usuario con privilegios de administrador conseguir acceso en el host por medio de la funcionalidad "manage files", lo que puede resultar en una ejecución de código remota Pluck CMS version 4.7.13 suffers from a remote shell upload vulnerability. • https://www.exploit-db.com/exploits/49909 https://github.com/0xAbbarhSF/CVE-2020-29607 https://github.com/0xN7y/CVE-2020-29607 http://packetstormsecurity.com/files/162785/Pluck-CMS-4.7.13-Remote-Shell-Upload.html https://github.com/Hacker5preme/Exploits/tree/main/CVE-2020-29607-Exploit https://github.com/pluck-cms/pluck/issues/96 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 2

An issue was discovered in Pluck CMS 4.7.10-dev2 and 4.7.11. There is a file upload vulnerability that can cause a remote command execution via admin.php?action=files. Se detectó un problema en Pluck CMS versión 4.7.10-dev2 y versión 4.7.11. Se presenta una vulnerabilidad de carga de archivos que puede causar una ejecución de comando remota por medio de admin.php? • https://github.com/pluck-cms/pluck/issues/83 https://github.com/pluck-cms/pluck/issues/91 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

PluckCMS 4.7.4 and earlier is affected by: CWE-434 Unrestricted Upload of File with Dangerous Type. The impact is: get webshell. The component is: data/inc/images.php line36. The attack vector is: modify the MIME TYPE on HTTP request to upload a php file. The fixed version is: after commit 09f0ab871bf633973cfd9fc4fe59d4a912397cf8. • https://github.com/pluck-cms/pluck/commit/09f0ab871bf633973cfd9fc4fe59d4a912397cf8 https://github.com/pluck-cms/pluck/issues/44 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1

data/inc/files.php in Pluck 4.7.8 allows remote attackers to execute arbitrary code by uploading a .htaccess file that specifies SetHandler x-httpd-php for a .txt file, because only certain PHP-related filename extensions are blocked. Vulnerabilidad en archivo Data/Inc/files.php en Pluck versión 4.7.8 permite a los atacantes remotos ejecutar código arbitrario cargando un archivo .htaccess que especifica SetHandler x-httpd-php para un archivo .txt, debido a que solo se bloquean ciertas extensiones de nombre de archivo relacionadas con PHP. • https://github.com/pluck-cms/pluck/issues/72 • CWE-434: Unrestricted Upload of File with Dangerous Type •