Логотип exploitDog
bind:CVE-2020-37117
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-37117

Количество 2

Количество 2

nvd логотип

CVE-2020-37117

4 дня назад

jizhiCMS 1.6.7 contains a file download vulnerability in the admin plugins update endpoint that allows authenticated administrators to download arbitrary files. Attackers can exploit the vulnerability by sending crafted POST requests with malicious filepath and download_url parameters to trigger unauthorized file downloads.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-m4vr-wgxw-jjm6

4 дня назад

jizhiCMS 1.6.7 contains a file download vulnerability in the admin plugins update endpoint that allows authenticated administrators to download arbitrary files. Attackers can exploit the vulnerability by sending crafted POST requests with malicious filepath and download_url parameters to trigger unauthorized file downloads.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-37117

jizhiCMS 1.6.7 contains a file download vulnerability in the admin plugins update endpoint that allows authenticated administrators to download arbitrary files. Attackers can exploit the vulnerability by sending crafted POST requests with malicious filepath and download_url parameters to trigger unauthorized file downloads.

CVSS3: 8.8
0%
Низкий
4 дня назад
github логотип
GHSA-m4vr-wgxw-jjm6

jizhiCMS 1.6.7 contains a file download vulnerability in the admin plugins update endpoint that allows authenticated administrators to download arbitrary files. Attackers can exploit the vulnerability by sending crafted POST requests with malicious filepath and download_url parameters to trigger unauthorized file downloads.

CVSS3: 8.8
0%
Низкий
4 дня назад

Уязвимостей на страницу