CVE-2020-27387

An unrestricted file upload issue in HorizontCMS through 1.0.0-beta allows an authenticated remote attacker (with access to the FileManager) to upload and execute arbitrary PHP code by uploading a PHP payload, and then using the FileManager's rename function to provide the payload (which will receive a random name on the server) with the PHP extension, and finally executing the PHP file via an HTTP GET request to /storage/<php_file_name>. NOTE: the vendor has patched this while leaving the version number at 1.0.0-beta.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
VendorProductVersion
horizontcms_projecthorizontcms
1.0.0:alpha
horizontcms_projecthorizontcms
1.0.0:alpha2
horizontcms_projecthorizontcms
1.0.0:alpha3
horizontcms_projecthorizontcms
1.0.0:alpha4
horizontcms_projecthorizontcms
1.0.0:alpha5
horizontcms_projecthorizontcms
1.0.0:alpha6
horizontcms_projecthorizontcms
1.0.0:alpha7
horizontcms_projecthorizontcms
1.0.0:alpha8
horizontcms_projecthorizontcms
1.0.0:beta
𝑥
= Vulnerable software versions