CVE-2020-18184
Published: 2 October 2020
In PluxXml V5.7,the theme edit function /PluXml/core/admin/parametres_edittpl.php allows remote attackers to execute arbitrary PHP code by placing this code into a template.
Notes
Author | Note |
---|---|
seth-arnold | I've asked if this is an intentional feature or not; the documentation suggests to me that it is intentional for the administrator to be able to execute arbitrary code. |
leosilva | deferred as no fix as 2021-10-19. |
Priority
Status
Package | Release | Status |
---|---|---|
pluxml Launchpad, Ubuntu, Debian |
bionic |
Deferred
(2021-10-19)
|
focal |
Deferred
(2021-10-19)
|
|
groovy |
Ignored
(end of life)
|
|
hirsute |
Ignored
(end of life)
|
|
impish |
Ignored
(end of life)
|
|
jammy |
Deferred
(2021-10-19)
|
|
kinetic |
Does not exist
|
|
lunar |
Does not exist
|
|
mantic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Needs triage
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.2 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | High |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |