9
CVSSv2

CVE-2020-7799

Published: 28/01/2020 Updated: 21/07/2021
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 802
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

An issue exists in FusionAuth prior to 1.11.0. An authenticated user, allowed to edit e-mail templates (Home -> Settings -> Email Templates) or themes (Home -> Settings -> Themes), can execute commands on the underlying operating system by abusing freemarker.template.utility.Execute in the Apache FreeMarker engine that processes custom templates.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fusionauth fusionauth

Exploits

FusionAuth versions 110 and below suffer from a remote command execution vulnerability An authenticated attacker with enough privileges to access the template editing functions (either site templates or e-mail templates) in the FusionAuth dashboard can execute commands on the underlying operating system using the Apache FreeMarker Expression lang ...

Github Repositories

cve-2020-7799 批量检测cve-2020-7799 在同目录下添加一个texttxt文件 文件内url格式如下所示: wwwbaiducom 132231132132 1331212213:8080 运行即可python3 cve-2020-7799py 注意:禁止使用本项目所有资源进行非法测试!

批量检测cve-2020-7799

cve-2020-7799 批量检测cve-2020-7799 在同目录下添加一个texttxt文件 文件内url格式如下所示: wwwbaiducom 132231132132 1331212213:8080 运行即可python3 cve-2020-7799py 注意:禁止使用本项目所有资源进行非法测试!