578
VMScore

CVE-2020-36079

Published: 26/02/2021 Updated: 11/04/2024
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Zenphoto up to and including 1.5.7 is affected by authenticated arbitrary file upload, leading to remote code execution. The attacker must navigate to the uploader plugin, check the elFinder box, and then drag and drop files into the Files(elFinder) portion of the UI. This can, for example, place a .php file in the server's uploaded/ directory. NOTE: the vendor disputes this because exploitation can only be performed by an admin who has "lots of other possibilities to harm a site.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zenphoto zenphoto

Exploits

Zenphoto CMS versions 157 and below suffer from a remote shell upload vulnerability ...

Github Repositories

ZenPhoto CMSv 157- Authenticated arbitrary file upload to RCE -PoC Dated: 14 Jun 2021 - Author: F-Masood Description: This is a manual way of exploiting the CVE-2020-36079 vulnerablity which was reported by Abdulaziz Almisfer Need: There was no PoC out, so I made one ̿̿ ̿̿ ̿̿ ̿'̿'\̵͇̿̿\з= ( ▀ ͜͞ʖ▀) =ε/̵͇̿̿/’̿’̿ ̿ ̿̿