Remote Code Execution Vulnerability in CMS Made Simple Filemanager
CVE-2020-10682
7.8HIGH
Summary
A vulnerability in the Filemanager of CMS Made Simple version 2.2.13 allows attackers to execute arbitrary PHP code by uploading a specially crafted '.php.jpegd' file. This file, when sent as 'application/octet-stream', bypasses standard file type checks, enabling unauthorized remote code execution. Attackers can exploit this flaw to gain control over the application, leading to potential data breaches and compromise of the server.
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved