CVE-2020-13443
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
ExpressionEngine before 5.3.2 allows remote attackers to upload and execute arbitrary code in a .php%20 file via Compose Msg, Add attachment, and Save As Draft actions. A user with low privileges (member) is able to upload this. It is possible to bypass the MIME type check and file-extension check while uploading new files. Short aliases are not used for an attachment; instead, direct access is allowed to the uploaded files. It is possible to upload PHP only if one has member access, or registration/forum is enabled and one can create a member with the default group id of 5. To exploit this, one must to be able to send and compose messages (at least).
ExpressionEngine versiones anteriores a 5.3.2, permite a atacantes remotos cargar y ejecutar código arbitrario en un archivo .php%20 por medio de las acciones Componer Msg, Add attachment y Save As Draft. Un usuario con pocos privilegios (miembro) es capaz de cargar esto. Es posible omitir la comprobación del tipo MIME y la comprobación de extensión de archivo al cargar nuevos archivos. Los seudónimos cortos no se usan para un archivo adjunto; en cambio, se permite el acceso directo a los archivos cargados. Es posible cargar PHP solo si uno tiene acceso de miembro, o registration/forum está habilitado y uno puede crear un miembro con el ID de grupo predeterminado de 5. Para explotar esto, uno debe ser capaz de enviar y redactar mensajes (al menos)
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-05-25 CVE Reserved
- 2020-06-24 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2025-01-05 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-434: Unrestricted Upload of File with Dangerous Type
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://gist.github.com/mariuszpoplwski/51604d8a6d7d78fffdf590c25e844e09 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://expressionengine.com/blog | 2020-07-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Expressionengine Search vendor "Expressionengine" | Expressionengine Search vendor "Expressionengine" for product "Expressionengine" | < 5.3.2 Search vendor "Expressionengine" for product "Expressionengine" and version " < 5.3.2" | - |
Affected
|