Filtered by vendor Horizontcms Project
Subscriptions
Filtered by product Horizontcms
Subscriptions
Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-27387 | 1 Horizontcms Project | 1 Horizontcms | 2022-10-19 | 8.8 High |
An unrestricted file upload issue in HorizontCMS through 1.0.0-beta allows an authenticated remote attacker (with access to the FileManager) to upload and execute arbitrary PHP code by uploading a PHP payload, and then using the FileManager's rename function to provide the payload (which will receive a random name on the server) with the PHP extension, and finally executing the PHP file via an HTTP GET request to /storage/<php_file_name>. NOTE: the vendor has patched this while leaving the version number at 1.0.0-beta. | ||||
CVE-2021-28428 | 1 Horizontcms Project | 1 Horizontcms | 2022-04-15 | 9.8 Critical |
File upload vulnerability in HorizontCMS before 1.0.0-beta.3 via uploading a .htaccess and *.hello files using the Media Files upload functionality. The original file upload vulnerability (CVE-2020-27387) was remediated by restricting the PHP extensions; however, we confirmed that the filter was bypassed via uploading an arbitrary .htaccess and *.hello files in order to execute PHP code to gain RCE. | ||||
CVE-2022-25104 | 1 Horizontcms Project | 1 Horizontcms | 2022-03-03 | 7.5 High |
HorizontCMS v1.0.0-beta.2 was discovered to contain an arbitrary file download vulnerability via the component /admin/file-manager/. | ||||
CVE-2020-28693 | 1 Horizontcms Project | 1 Horizontcms | 2020-11-30 | 8.8 High |
An unrestricted file upload issue in HorizontCMS 1.0.0-beta allows an authenticated remote attacker to upload PHP code through a zip file by uploading a theme, and executing the PHP file via an HTTP GET request to /themes/<php_file_name> |
Page 1 of 1.