Vulnerability Description
OpenSolution Quick.CMS < 6.7 and Quick.Cart < 6.7 allow an authenticated user to perform code injection (and consequently Remote Code Execution) via the input fields of the Language tab.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opensolution | Quick.Cart | < 6.7 |
| Opensolution | Quick.Cms | < 6.7 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/161189/Quick.CMS-6.7-Remote-Code-Execution.ExploitThird Party AdvisoryVDB Entry
- https://opensolution.org/cms-system-quick-cms.htmlProduct
- https://opensolution.org/security-fix-for-cart-and-cms%21-en-1136.html
- https://secator.pl/index.php/2021/01/28/cve-2020-35754-authenticated-rce-in-quicExploitThird Party Advisory
- http://packetstormsecurity.com/files/161189/Quick.CMS-6.7-Remote-Code-Execution.ExploitThird Party AdvisoryVDB Entry
- https://opensolution.org/cms-system-quick-cms.htmlProduct
- https://opensolution.org/security-fix-for-cart-and-cms%21-en-1136.html
- https://secator.pl/index.php/2021/01/28/cve-2020-35754-authenticated-rce-in-quicExploitThird Party Advisory
FAQ
What is CVE-2020-35754?
CVE-2020-35754 is a vulnerability with a CVSS score of 7.2 (HIGH). OpenSolution Quick.CMS < 6.7 and Quick.Cart < 6.7 allow an authenticated user to perform code injection (and consequently Remote Code Execution) via the input fields of the Language tab.
How severe is CVE-2020-35754?
CVE-2020-35754 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-35754?
Check the references section above for vendor advisories and patch information. Affected products include: Opensolution Quick.Cart, Opensolution Quick.Cms.