CVE-2020-29607 – Pluck CMS 4.7.13 - File Upload Remote Code Execution (Authenticated)
https://notcve.org/view.php?id=CVE-2020-29607
A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution. Una vulnerabilidad de omisión de restricción de carga de archivos en Pluck CMS versiones anteriores a 4.7.13, permite a un usuario con privilegios de administrador conseguir acceso en el host por medio de la funcionalidad "manage files", lo que puede resultar en una ejecución de código remota Pluck CMS version 4.7.13 suffers from a remote shell upload vulnerability. • https://www.exploit-db.com/exploits/49909 https://github.com/0xAbbarhSF/CVE-2020-29607 https://github.com/0xN7y/CVE-2020-29607 http://packetstormsecurity.com/files/162785/Pluck-CMS-4.7.13-Remote-Shell-Upload.html https://github.com/Hacker5preme/Exploits/tree/main/CVE-2020-29607-Exploit https://github.com/pluck-cms/pluck/issues/96 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2020-21564
https://notcve.org/view.php?id=CVE-2020-21564
An issue was discovered in Pluck CMS 4.7.10-dev2 and 4.7.11. There is a file upload vulnerability that can cause a remote command execution via admin.php?action=files. Se detectó un problema en Pluck CMS versión 4.7.10-dev2 y versión 4.7.11. Se presenta una vulnerabilidad de carga de archivos que puede causar una ejecución de comando remota por medio de admin.php? • https://github.com/pluck-cms/pluck/issues/83 https://github.com/pluck-cms/pluck/issues/91 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2019-11344
https://notcve.org/view.php?id=CVE-2019-11344
data/inc/files.php in Pluck 4.7.8 allows remote attackers to execute arbitrary code by uploading a .htaccess file that specifies SetHandler x-httpd-php for a .txt file, because only certain PHP-related filename extensions are blocked. Vulnerabilidad en archivo Data/Inc/files.php en Pluck versión 4.7.8 permite a los atacantes remotos ejecutar código arbitrario cargando un archivo .htaccess que especifica SetHandler x-httpd-php para un archivo .txt, debido a que solo se bloquean ciertas extensiones de nombre de archivo relacionadas con PHP. • https://github.com/pluck-cms/pluck/issues/72 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2019-9050
https://notcve.org/view.php?id=CVE-2019-9050
An issue was discovered in Pluck 4.7.9-dev1. It allows administrators to execute arbitrary code by using action=installmodule to upload a ZIP archive, which is then extracted and executed. Se ha descubierto un problema en Pluck 4.7.9-dev1. Permite que los administradores ejecuten código arbitrario utilizando action=installmodule para subir un archivo ZIP, que se extrae y ejecuta. • https://github.com/pluck-cms/pluck/issues/70 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2019-9049
https://notcve.org/view.php?id=CVE-2019-9049
An issue was discovered in Pluck 4.7.9-dev1. There is a CSRF vulnerability that can delete modules via a /admin.php?action=module_delete&var1= URI. Se ha descubierto un problema en Pluck 4.7.9-dev1. Hay una vulnerabilidad Cross-Site Request Forgery (CSRF) que puede eliminar módulos mediante un URI /admin.php? • https://github.com/pluck-cms/pluck/issues/69 • CWE-352: Cross-Site Request Forgery (CSRF) •