8 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

Pluck CMS is vulnerable to an authenticated remote code execution (RCE) vulnerability through its “albums” module. Albums are used to create collections of images that can be inserted into web pages across the site. Albums allow the upload of various filetypes, which undergo a normalization process before being available on the site. Due to lack of file extension validation, it is possible to upload a crafted JPEG payload containing an embedded PHP web-shell. An attacker may navigate to it directly to achieve RCE on the underlying web server. • https://www.synopsys.com/blogs/software-security/pluck-cms-vulnerability • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.2EPSS: 3%CPEs: 1EXPL: 6

A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution. Una vulnerabilidad de omisión de restricción de carga de archivos en Pluck CMS versiones anteriores a 4.7.13, permite a un usuario con privilegios de administrador conseguir acceso en el host por medio de la funcionalidad "manage files", lo que puede resultar en una ejecución de código remota Pluck CMS version 4.7.13 suffers from a remote shell upload vulnerability. • https://www.exploit-db.com/exploits/49909 https://github.com/0xAbbarhSF/CVE-2020-29607 https://github.com/0xN7y/CVE-2020-29607 http://packetstormsecurity.com/files/162785/Pluck-CMS-4.7.13-Remote-Shell-Upload.html https://github.com/Hacker5preme/Exploits/tree/main/CVE-2020-29607-Exploit https://github.com/pluck-cms/pluck/issues/96 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 1

An issue was discovered in Pluck before 4.7.7-dev2. /data/inc/images.php allows remote attackers to upload and execute arbitrary PHP code by using the image/jpeg content type for a .htaccess file. Se ha descubierto un problema en Pluck en versiones anteriores a la 4.7.7-dev2. /data/inc/images.php permite que los atacantes remotos suban y ejecutan código PHP arbitrario utilizando el tipo de contenido image/jpeg para un archivo .htaccess. • https://github.com/pluck-cms/pluck/issues/61 https://github.com/pluck-cms/pluck/releases/tag/4.7.7-dev2 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Pluck before 4.7.6. Remote PHP code execution is possible because the set of disallowed filetypes for uploads in missing some applicable ones such as .phtml and .htaccess. Se ha descubierto un problema en versiones anteriores a la 4.7.6 de Pluck. Es posible la ejecución remota de código PHP debido a que el conjunto de tipos de archivo no permitidos para la subida carece de algunos tipos aplicables, como .phtml y .htaccess. • https://github.com/pluck-cms/pluck/commit/8f6541e60c9435e82e9c531a20cb3c218d36976e https://github.com/pluck-cms/pluck/issues/58 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Pluck before 4.7.6. There is authenticated stored XSS because the character set for filenames is not properly restricted. Se ha descubierto un problema en versiones anteriores a la 4.7.6 de Pluck. Hay Cross-Site Scripting (XSS) persistente autenticado debido a que el conjunto de caracteres para los nombres de archivo no está restringido de forma adecuada. • https://github.com/pluck-cms/pluck/commit/8f6541e60c9435e82e9c531a20cb3c218d36976e https://github.com/pluck-cms/pluck/issues/58 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •