9.8
CVSSv3

CVE-2020-28871

Published: 10/02/2021 Updated: 26/01/2024
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 791
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Remote code execution in Monitorr v1.7.6m in upload.php allows an unauthorized person to execute arbitrary code on the server-side via an insecure file upload.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

monitorr monitorr 1.7.6m

Exploits

This Metasploit module exploits an arbitrary file upload vulnerability and achieves remote code execution in the Monitorr application Using a specially crafted request, custom PHP code can be uploaded and injected through endpoint uploadphp because of missing input validation Any user privileges can exploit this vulnerability and it results in a ...
Monitorr version 176 remote shell upload proof of concept exploit written in Python ...
This module exploits an arbitrary file upload vulnerability and achieving an RCE in the Monitorr application Using a specially crafted request, custom PHP code can be uploaded and injected through endpoint uploadphp because of missing input validation Any user privileges can exploit this vulnerability and it results in access ...

Metasploit Modules

Monitorr unauthenticated Remote Code Execution (RCE)

This module exploits an arbitrary file upload vulnerability and achieving an RCE in the Monitorr application. Using a specially crafted request, custom PHP code can be uploaded and injected through endpoint upload.php because of missing input validation. Any user privileges can exploit this vulnerability and it results in access to the underlying operating system with the same privileges under which the web services run (typically user www-data). Monitorr 1.7.6m, 1.7.7d and below are affected.

msf > use exploit/multi/http/monitorr_webshell_rce_cve_2020_28871
msf exploit(monitorr_webshell_rce_cve_2020_28871) > show targets
    ...targets...
msf exploit(monitorr_webshell_rce_cve_2020_28871) > set TARGET < target-id >
msf exploit(monitorr_webshell_rce_cve_2020_28871) > show options
    ...show and set options...
msf exploit(monitorr_webshell_rce_cve_2020_28871) > exploit

Github Repositories

Monitorr Unrestricted File Upload

Monitorr 176m Unrestricted File Upload CVE-2020-28871 If you want to use your own shell, change nastarphp and put your shell in the same folder

Multiple exploits for Monitorr

Monitorr exploit toolkit RCE via unsecure file upload (PHP reverse shell, webshell, etc) Administrator account creation via Authorization bypass Technical information leakage: Monitorr version, PHP version, System version &amp; kernel, PHP config, etc Exploit for CVE-2020-28872 and CVE-2020-28871 [PacketStorm] Usage $ ruby exploitrb -h Monitorr-Exploit Usage: explo