Vulnerability Details : CVE-2020-27191
Potential exploit
LionWiki before 3.2.12 allows an unauthenticated user to read files as the web server user via crafted string in the index.php f1 variable, aka Local File Inclusion. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Vulnerability category: File inclusion
Products affected by CVE-2020-27191
- cpe:2.3:a:lionwiki:lionwiki:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-27191
77.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-27191
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
References for CVE-2020-27191
-
https://www.junebug.site/blog/cve-2020-27191-lionwiki-3-2-11-lfi
CVE-2020-27191 Lionwiki 3.2.11 LFIExploit;Third Party Advisory
-
http://lionwiki.0o.cz/index.php?page=Main+page
Main page - LionWikiVendor Advisory
Jump to