Vulnerability Description
Remote code execution in Monitorr v1.7.6m in upload.php allows an unauthorized person to execute arbitrary code on the server-side via an insecure file upload.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Monitorr | Monitorr | 1.7.6m |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/163263/Monitorr-1.7.6m-Bypass-Information-DExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/170974/Monitorr-1.7.6-Shell-Upload.html
- http://packetstormsecurity.com/files/171429/Monitorr-1.7.6m-1.7.7d-Remote-Code-E
- https://lyhinslab.org/index.php/2020/09/12/how-the-white-box-hacking-works-authoExploitThird Party Advisory
- https://www.exploit-db.com/exploits/48980ExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/163263/Monitorr-1.7.6m-Bypass-Information-DExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/170974/Monitorr-1.7.6-Shell-Upload.html
- http://packetstormsecurity.com/files/171429/Monitorr-1.7.6m-1.7.7d-Remote-Code-E
- https://lyhinslab.org/index.php/2020/09/12/how-the-white-box-hacking-works-authoExploitThird Party Advisory
- https://www.exploit-db.com/exploits/48980ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2020-28871?
CVE-2020-28871 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Remote code execution in Monitorr v1.7.6m in upload.php allows an unauthorized person to execute arbitrary code on the server-side via an insecure file upload.
How severe is CVE-2020-28871?
CVE-2020-28871 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-28871?
Check the references section above for vendor advisories and patch information. Affected products include: Monitorr Monitorr.