Vulnerability Description
The Filemanager in CMS Made Simple 2.2.13 allows remote code execution via a .php.jpegd JPEG file, as demonstrated by m1_files[] to admin/moduleinterface.php. The file should be sent as application/octet-stream and contain PHP code (it need not be a valid JPEG file).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cmsmadesimple | Cms Made Simple | 2.2.13 |
Related Weaknesses (CWE)
References
- http://dev.cmsmadesimple.org/bug/view/12275ExploitVendor Advisory
- http://dev.cmsmadesimple.org/bug/view/12275ExploitVendor Advisory
FAQ
What is CVE-2020-10682?
CVE-2020-10682 is a vulnerability with a CVSS score of 7.8 (HIGH). The Filemanager in CMS Made Simple 2.2.13 allows remote code execution via a .php.jpegd JPEG file, as demonstrated by m1_files[] to admin/moduleinterface.php. The file should be sent as application/oc...
How severe is CVE-2020-10682?
CVE-2020-10682 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-10682?
Check the references section above for vendor advisories and patch information. Affected products include: Cmsmadesimple Cms Made Simple.