ID CVE-2018-10520 Type cve Reporter cve@mitre.org Modified 2019-10-03T00:03:00
Description
In CMS Made Simple (CMSMS) through 2.2.7, the "module remove" operation in the admin dashboard contains an arbitrary file deletion vulnerability that can cause DoS, exploitable by an admin user, because the attacker can remove all lib/ files in all directories.
{"id": "CVE-2018-10520", "bulletinFamily": "NVD", "title": "CVE-2018-10520", "description": "In CMS Made Simple (CMSMS) through 2.2.7, the \"module remove\" operation in the admin dashboard contains an arbitrary file deletion vulnerability that can cause DoS, exploitable by an admin user, because the attacker can remove all lib/ files in all directories.", "published": "2018-04-27T18:29:00", "modified": "2019-10-03T00:03:00", "cvss": {"score": 8.5, "vector": "AV:N/AC:L/Au:S/C:N/I:C/A:C"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10520", "reporter": "cve@mitre.org", "references": ["https://github.com/itodaro/cmsms_cve/blob/master/README.md"], "cvelist": ["CVE-2018-10520"], "type": "cve", "lastseen": "2020-12-09T20:25:30", "edition": 6, "viewCount": 4, "enchantments": {"dependencies": {"references": [], "modified": "2020-12-09T20:25:30", "rev": 2}, "score": {"value": 3.3, "vector": "NONE", "modified": "2020-12-09T20:25:30", "rev": 2}, "vulnersScore": 3.3}, "cpe": ["cpe:/a:cmsmadesimple:cms_made_simple:2.2.7"], "affectedSoftware": [{"cpeName": "cmsmadesimple:cms_made_simple", "name": "cmsmadesimple cms made simple", "operator": "le", "version": "2.2.7"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 1.2, "impactScore": 5.2}, "cpe23": ["cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.7:*:*:*:*:*:*:*"], "cwe": ["CWE-732"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.7:*:*:*:*:*:*:*", "versionEndIncluding": "2.2.7", "vulnerable": true}], "operator": "OR"}]}}