Vulnerability Description
Server-side request forgery in Wcms 0.3.2 let an attacker send crafted requests from the back-end server of a vulnerable web application via the pagename parameter to wex/html.php. It can help identify open ports, local network hosts and execute command on local services.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wcms | Wcms | 0.3.2 |
Related Weaknesses (CWE)
References
- https://github.com/secwx/research/blob/main/cve/CVE-2020-24140.mdThird Party Advisory
- https://github.com/vedees/wcms/issues/11ExploitThird Party Advisory
- https://github.com/secwx/research/blob/main/cve/CVE-2020-24140.mdThird Party Advisory
- https://github.com/vedees/wcms/issues/11ExploitThird Party Advisory
FAQ
What is CVE-2020-24140?
CVE-2020-24140 is a vulnerability with a CVSS score of 8.3 (HIGH). Server-side request forgery in Wcms 0.3.2 let an attacker send crafted requests from the back-end server of a vulnerable web application via the pagename parameter to wex/html.php. It can help identif...
How severe is CVE-2020-24140?
CVE-2020-24140 has been rated HIGH with a CVSS base score of 8.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-24140?
Check the references section above for vendor advisories and patch information. Affected products include: Wcms Wcms.