A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/162785/Pluck-CMS-4.7.13-Remote-Shell-Upload.html | Exploit Third Party Advisory VDB Entry |
https://github.com/Hacker5preme/Exploits/tree/main/CVE-2020-29607-Exploit | Exploit Third Party Advisory |
https://github.com/pluck-cms/pluck/issues/96 | Exploit Third Party Advisory |
Configurations
History
07 Feb 2022, 21:36
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/Hacker5preme/Exploits/tree/main/CVE-2020-29607-Exploit - Exploit, Third Party Advisory |
28 Jan 2022, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 May 2021, 19:58
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/162785/Pluck-CMS-4.7.13-Remote-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry |
26 May 2021, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2020-12-16 15:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-29607
Mitre link : CVE-2020-29607
CVE.ORG link : CVE-2020-29607
JSON object : View
Products Affected
pluck-cms
- pluck
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type