A remote code execution issue was discovered in HashBrown CMS through 1.3.3. Server/Entity/Deployer/GitDeployer.js has a Service.AppService.exec call that mishandles the URL, repository, username, and password.
References
Link | Resource |
---|---|
https://github.com/HashBrownCMS/hashbrown-cms/issues/326 | Exploit Third Party Advisory |
https://github.com/HashBrownCMS/hashbrown-cms/issues/326 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/HashBrownCMS/hashbrown-cms/issues/326 - Exploit, Third Party Advisory |
Information
Published : 2020-01-13 19:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-6948
Mitre link : CVE-2020-6948
CVE.ORG link : CVE-2020-6948
JSON object : View
Products Affected
hashbrowncms
- hashbrown_cms
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')