6.5
CVSSv2

CVE-2020-25790

Published: 19/09/2020 Updated: 11/04/2024
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Typesetter CMS 5.x up to and including 5.1 allows admins to upload and execute arbitrary PHP code via a .php file inside a ZIP archive. NOTE: the vendor disputes the significance of this report because "admins are considered trustworthy"; however, the behavior "contradicts our security policy" and is being fixed for 5.2

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

typesettercms typesetter

Exploits

Typesetter CMS version 51 authenticated remote code execution exploit ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2020-25790 <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Rodolfo Augusto do Nascimento Tavares &lt; ...

Github Repositories

Typesetter CMS文件上传漏洞环境

CVE-2020-25790 Typesetter CMS文件上传漏洞环境 拉取方式 docker pull mtwf/typesetter_cve-2020-25790:51 docker run -it -d -p 80:80 mtwf/typesetter_cve-2020-25790:51 /bin/bash -c "service apache2 start;/bin/bash" typesetter账号密码为admin:admin 漏洞复现过程