CMS Made Simple <= 2.2.13 Multiple Vulnerabilities

Published: 2020-03-24 09:36:57
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:M/Au:S/C:C/I:C/A:C

Detection Type:
Remote Banner

Solution Type:
None Available

Summary:
CMS Made Simple is prone to multiple vulnerabilities.

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
The following vulnerabilities exist: - Stored XSS vulnerability by sending a crafted .pxd file via the m1_files[] parameter to admin/moduleinterface.php - Remote Code Execution vulnerability by sending a crafted .php.jpegd JPEG file via the m1_files[] parameter to admin/moduleinterface.php

Impact:
Successful exploitation would allow an attacker to inject arbitrary HTML or JavaScript into the site or execute arbitrary commands on the target machine.

Affected Versions:
CMS Made Simple through version 2.2.13.

Recommendations:
No known solution is available as of 24th March, 2020. Information regarding this issue will be updated once solution details are available.

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2020-10681
https://nvd.nist.gov/vuln/detail/CVE-2020-10682

References:

http://dev.cmsmadesimple.org/bug/view/12274
http://dev.cmsmadesimple.org/bug/view/12275

Search
Severity
High
CVSS Score
8.5

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.