Vulnerability Details : CVE-2020-29592
Potential exploit
An issue was discovered in Orchard before 1.10. A broken access control issue in Orchard components that use the TinyMCE HTML editor's file upload allows an attacker to upload dangerous executables that bypass the file types allowed (regardless of the file types allowed list in Media settings).
Products affected by CVE-2020-29592
- cpe:2.3:a:orchardproject:orchard:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-29592
13.00%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-29592
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2020-29592
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-29592
-
https://github.com/OrchardCMS/Orchard/releases
Releases · OrchardCMS/Orchard · GitHubRelease Notes;Third Party Advisory
-
https://burninatorsec.blogspot.com/2021/04/cve-2020-29592-and-cve-2020-29593.html
Burninator Sec: CVE-2020-29592 and CVE-2020-29593 - Orchard CMS Unrestricted File Upload and XSSExploit;Third Party Advisory
Jump to