6.5
CVSSv2

CVE-2020-29607

Published: 16/12/2020 Updated: 07/02/2022
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 580
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

A file upload restriction bypass vulnerability in Pluck CMS prior to 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pluck-cms pluck

Exploits

Pluck CMS version 4713 suffers from a remote shell upload vulnerability ...

Github Repositories

A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution.

CVE-2020-29607-Exploit Exploit Title: Pluck CMS 4713 - File Upload Remote Code Execution (Authenticated) CVE description: A file upload restriction bypass vulnerability in Pluck CMS before 4713 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution nvdnistgov/vuln/d

Personal attempt on THM CTF Challenge

THM-Dreaming Personal attempt on THM CTF Challenge DREAMING RECON Access the target's website, we can only see Apache's default site Let's do some directory enumeration with nmap and http-enum script Accessing the directoy, we know that the web is using Pluck CMS 4713 EXPLOIT Upon a quick Google search, we can tell that this version of Pluck is vulnerabl

Exploit forCVE-2020-29607

CVE-2020-29607 Exploit for CVE-2020-29607 Usage