Vulnerability Details : CVE-2021-27817
A remote command execution vulnerability in shopxo 1.9.3 allows an attacker to upload malicious code generated by phar where the suffix is JPG, which is uploaded after modifying the phar suffix.
Exploit prediction scoring system (EPSS) score for CVE-2021-27817
Probability of exploitation activity in the next 30 days: 0.49%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 73 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2021-27817
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2021-27817
-
The product allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-27817
-
https://github.com/h4ckdepy/vuls/blob/main/shopxo.md
vuls/shopxo.md at main · h4ckdepy/vuls · GitHubBroken Link
-
https://github.com/gongfuxiang/shopxo
GitHub - gongfuxiang/shopxo: ShopXO免费开源商城系统、国内领先企业级B2C免费开源电商系统,包含PC、h5、微信小程序、支付宝小程序、百度小程序、头条&抖音小程序、QQ小程序,遵循MIT开源协议发布、基于 ThinkPHP5.1框架研发Product
Products affected by CVE-2021-27817
- cpe:2.3:a:shopxo:shopxo:1.9.3:*:*:*:*:*:*:*