Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-32630
HistoryMay 20, 2021 - 4:45 p.m.

CVE-2021-32630 Various

2021-05-2016:45:12
CWE-434
GitHub_M
www.cve.org

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

9.3 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.4%

Admidio is a free, open source user management system for websites of organizations and groups. In Admidio before version 4.0.4, there is an authenticated RCE via .phar file upload. A php web shell can be uploaded via the Documents & Files upload feature. Someone with upload permissions could rename the php shell with a .phar extension, visit the file, triggering the payload for a reverse/bind shell. This can be mitigated by excluding a .phar file extension to be uploaded (like you did with .php .phtml .php5 etc). The vulnerability is patched in version 4.0.4.

CNA Affected

[
  {
    "product": "admidio",
    "vendor": "Admidio",
    "versions": [
      {
        "status": "affected",
        "version": "< 4.0.4"
      }
    ]
  }
]

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

9.3 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.4%

Related for CVELIST:CVE-2021-32630