A remote code execution vulnerability in SEOPanel 4.6.0 has been fixed for 4.7.0. This vulnerability allowed for remote code execution through an authenticated file upload via the Settings Panel>Import website function.
References
Link | Resource |
---|---|
https://sourceforge.net/projects/seopanel/files/seopanel.v.4.6.0.zip/download | Patch Third Party Advisory |
https://www.exploit-db.com/exploits/48862 | Exploit Third Party Advisory VDB Entry |
https://www.seopanel.org/ | Product |
https://sourceforge.net/projects/seopanel/files/seopanel.v.4.6.0.zip/download | Patch Third Party Advisory |
https://www.exploit-db.com/exploits/48862 | Exploit Third Party Advisory VDB Entry |
https://www.seopanel.org/ | Product |
Configurations
History
21 Nov 2024, 05:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://sourceforge.net/projects/seopanel/files/seopanel.v.4.6.0.zip/download - Patch, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/48862 - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.seopanel.org/ - Product |
Information
Published : 2021-08-20 19:15
Updated : 2024-11-21 05:21
NVD link : CVE-2020-27461
Mitre link : CVE-2020-27461
CVE.ORG link : CVE-2020-27461
JSON object : View
Products Affected
seopanel
- seopanel
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type