MEDIUM · 6.4

CVE-2020-11084

In iPear, the manual execution of the eval() function can lead to command injection. Only PCs where commands are manually executed via "For Developers" are affected. This function allows executing any...

Vulnerability Description

In iPear, the manual execution of the eval() function can lead to command injection. Only PCs where commands are manually executed via "For Developers" are affected. This function allows executing any PHP code within iPear which may change, damage, or steal data (files) from the PC.

CVSS Score

6.4

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE

Affected Products

VendorProductVersions
Ipear ProjectIpear0.6.14

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-11084?

CVE-2020-11084 is a vulnerability with a CVSS score of 6.4 (MEDIUM). In iPear, the manual execution of the eval() function can lead to command injection. Only PCs where commands are manually executed via "For Developers" are affected. This function allows executing any...

How severe is CVE-2020-11084?

CVE-2020-11084 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-11084?

Check the references section above for vendor advisories and patch information. Affected products include: Ipear Project Ipear.