A remote command execution vulnerability in shopxo 1.9.3 allows an attacker to upload malicious code generated by phar where the suffix is JPG, which is uploaded after modifying the phar suffix.
Published 2021-03-15 17:15:22
Updated 2021-03-18 16:17:09
Source MITRE
View at NVD,   CVE.org

Exploit prediction scoring system (EPSS) score for CVE-2021-27817

Probability of exploitation activity in the next 30 days: 0.49%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 73 % EPSS Score History EPSS FAQ

CVSS scores for CVE-2021-27817

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source
7.5
HIGH AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
NIST
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
NIST

CWE ids for CVE-2021-27817

References for CVE-2021-27817

  • https://github.com/h4ckdepy/vuls/blob/main/shopxo.md
    vuls/shopxo.md at main · h4ckdepy/vuls · GitHub
    Broken Link
  • https://github.com/gongfuxiang/shopxo
    GitHub - gongfuxiang/shopxo: ShopXO免费开源商城系统、国内领先企业级B2C免费开源电商系统,包含PC、h5、微信小程序、支付宝小程序、百度小程序、头条&抖音小程序、QQ小程序,遵循MIT开源协议发布、基于 ThinkPHP5.1框架研发
    Product

Products affected by CVE-2021-27817

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!