Vulnerability Description
Directory traversal vulnerability in FileZen versions from V3.0.0 to V4.2.2 allows remote attackers to upload an arbitrary file in a specific directory via unspecified vectors. As a result, an arbitrary OS command may be executed.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Soliton | Filezen | >= 3.0.0, <= 4.2.2 |
Related Weaknesses (CWE)
References
- https://jvn.jp/en/jp/JVN12884935/index.htmlThird Party Advisory
- https://jvn.jp/jp/JVN12884935/index.htmlThird Party Advisory
- https://www.soliton.co.jp/support/2020/004278.htmlVendor Advisory
- https://jvn.jp/en/jp/JVN12884935/index.htmlThird Party Advisory
- https://jvn.jp/jp/JVN12884935/index.htmlThird Party Advisory
- https://www.soliton.co.jp/support/2020/004278.htmlVendor Advisory
FAQ
What is CVE-2020-5639?
CVE-2020-5639 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Directory traversal vulnerability in FileZen versions from V3.0.0 to V4.2.2 allows remote attackers to upload an arbitrary file in a specific directory via unspecified vectors. As a result, an arbitra...
How severe is CVE-2020-5639?
CVE-2020-5639 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-5639?
Check the references section above for vendor advisories and patch information. Affected products include: Soliton Filezen.