An arbitrary file upload issue exists in Mara CMS 7.5. In order to exploit this, an attacker must have a valid authenticated (admin/manager) session and make a codebase/dir.php?type=filenew request to upload PHP code to codebase/handler.php.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/159304/MaraCMS-7.5-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://sourceforge.net/projects/maracms/ | Product Third Party Advisory |
https://www.exploit-db.com/exploits/48780 | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/159304/MaraCMS-7.5-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://sourceforge.net/projects/maracms/ | Product Third Party Advisory |
https://www.exploit-db.com/exploits/48780 | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 05:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/159304/MaraCMS-7.5-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://sourceforge.net/projects/maracms/ - Product, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/48780 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2020-09-03 15:15
Updated : 2024-11-21 05:16
NVD link : CVE-2020-25042
Mitre link : CVE-2020-25042
CVE.ORG link : CVE-2020-25042
JSON object : View
Products Affected
maracms
- maracms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type