Логотип exploitDog
bind:CVE-2020-28337
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-28337

Количество 2

Количество 2

nvd логотип

CVE-2020-28337

почти 5 лет назад

A directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with file paths including relative paths (i.e., ../../), move this file into the backup directory, and execute a restore on this file.

CVSS3: 7.2
EPSS: Средний
github логотип

GHSA-pqcf-v8v5-jmcg

почти 4 года назад

Zip slip in Microweber

CVSS3: 7.2
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-28337

A directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with file paths including relative paths (i.e., ../../), move this file into the backup directory, and execute a restore on this file.

CVSS3: 7.2
14%
Средний
почти 5 лет назад
github логотип
GHSA-pqcf-v8v5-jmcg

Zip slip in Microweber

CVSS3: 7.2
14%
Средний
почти 4 года назад

Уязвимостей на страницу