Vulnerability Details : CVE-2020-27387
Public exploit exists!
An unrestricted file upload issue in HorizontCMS through 1.0.0-beta allows an authenticated remote attacker (with access to the FileManager) to upload and execute arbitrary PHP code by uploading a PHP payload, and then using the FileManager's rename function to provide the payload (which will receive a random name on the server) with the PHP extension, and finally executing the PHP file via an HTTP GET request to /storage/<php_file_name>. NOTE: the vendor has patched this while leaving the version number at 1.0.0-beta.
Products affected by CVE-2020-27387
- cpe:2.3:a:horizontcms_project:horizontcms:1.0.0:alpha:*:*:*:*:*:*
- cpe:2.3:a:horizontcms_project:horizontcms:1.0.0:alpha2:*:*:*:*:*:*
- cpe:2.3:a:horizontcms_project:horizontcms:1.0.0:alpha3:*:*:*:*:*:*
- cpe:2.3:a:horizontcms_project:horizontcms:1.0.0:alpha4:*:*:*:*:*:*
- cpe:2.3:a:horizontcms_project:horizontcms:1.0.0:alpha5:*:*:*:*:*:*
- cpe:2.3:a:horizontcms_project:horizontcms:1.0.0:alpha6:*:*:*:*:*:*
- cpe:2.3:a:horizontcms_project:horizontcms:1.0.0:alpha7:*:*:*:*:*:*
- cpe:2.3:a:horizontcms_project:horizontcms:1.0.0:alpha8:*:*:*:*:*:*
- cpe:2.3:a:horizontcms_project:horizontcms:1.0.0:beta:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-27387
17.64%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2020-27387
-
HorizontCMS Arbitrary PHP File Upload
Disclosure Date: 2020-09-24First seen: 2020-11-13exploit/multi/http/horizontcms_upload_execThis module exploits an arbitrary file upload vulnerability in HorizontCMS 1.0.0-beta in order to execute arbitrary commands. The module first attempts to authenticate to HorizontCMS. It then tries to upload a malicious PHP file via an HTTP POST request to
CVSS scores for CVE-2020-27387
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2020-27387
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-27387
-
https://github.com/ttimot24/HorizontCMS/commit/436b5ab679fd27afa3d99c023dbe103113da4fee
Security bug fix. · ttimot24/HorizontCMS@436b5ab · GitHubPatch;Third Party Advisory
-
https://github.com/rapid7/metasploit-framework/pull/14340
Add HorizontCMS 1.0.0-beta exploit module and documentation by kalba-security · Pull Request #14340 · rapid7/metasploit-framework · GitHubThird Party Advisory
-
https://blog.vonahi.io/whats-in-a-re-name/
What’s in a name: RCE Hunting in CMSs via Unrestricted File UploadExploit;Patch;Third Party Advisory
-
http://packetstormsecurity.com/files/160046/HorizontCMS-1.0.0-beta-Shell-Upload.html
HorizontCMS 1.0.0-beta Shell Upload ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to