A remote code execution vulnerability in SEOPanel 4.6.0 has been fixed for 4.7.0. This vulnerability allowed for remote code execution through an authenticated file upload via the Settings Panel>Import website function.
References
Link | Resource |
---|---|
https://sourceforge.net/projects/seopanel/files/seopanel.v.4.6.0.zip/download | Patch Third Party Advisory |
https://www.exploit-db.com/exploits/48862 | Exploit Third Party Advisory VDB Entry |
https://www.seopanel.org/ | Product |
Configurations
History
30 Aug 2021, 11:40
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 8.8 |
CWE | CWE-434 | |
CPE | cpe:2.3:a:seopanel:seopanel:4.6.0:*:*:*:*:*:*:* | |
References | (MISC) https://www.seopanel.org/ - Product | |
References | (MISC) https://www.exploit-db.com/exploits/48862 - Exploit, Third Party Advisory, VDB Entry | |
References | (MISC) https://sourceforge.net/projects/seopanel/files/seopanel.v.4.6.0.zip/download - Patch, Third Party Advisory |
20 Aug 2021, 19:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-08-20 19:15
Updated : 2024-02-04 21:47
NVD link : CVE-2020-27461
Mitre link : CVE-2020-27461
CVE.ORG link : CVE-2020-27461
JSON object : View
Products Affected
seopanel
- seopanel
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type