Vulnerability Description
Tea LaTex 1.0 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary shell commands through the /api.php endpoint. Attackers can craft a malicious LaTeX payload with shell commands that are executed when processed by the application's tex2png API action.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://github.com/ammarfaizi2/latex.teainside.org
- https://www.exploit-db.com/exploits/48805
- https://www.vulncheck.com/advisories/tea-latex-remote-code-execution
- https://www.exploit-db.com/exploits/48805
FAQ
What is CVE-2020-37012?
CVE-2020-37012 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Tea LaTex 1.0 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary shell commands through the /api.php endpoint. Attackers can craft a malicious La...
How severe is CVE-2020-37012?
CVE-2020-37012 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-37012?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.