CVE-2020-37113
EUVD-2020-3098203.02.2026, 18:16
GUnet OpenEclass 1.7.3 allows authenticated users to bypass file extension restrictions when uploading files. By renaming a PHP file to .php3 or .PhP, an attacker can upload a web shell and execute arbitrary code on the server. This vulnerability enables remote code execution by bypassing the intended file type checks in the exercise submission feature.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| gunet | open_eclass_platform | 1.7.3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration