First published: Fri Mar 20 2020(Updated: )
The Filemanager in CMS Made Simple 2.2.13 allows remote code execution via a .php.jpegd JPEG file, as demonstrated by m1_files[] to admin/moduleinterface.php. The file should be sent as application/octet-stream and contain PHP code (it need not be a valid JPEG file).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cmsmadesimple Cms Made Simple | =2.2.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10682 is a vulnerability found in the Filemanager of CMS Made Simple version 2.2.13, which allows remote code execution.
The Filemanager in CMS Made Simple version 2.2.13 can be exploited by uploading a .php.jpegd JPEG file that contains malicious PHP code.
To exploit CVE-2020-10682, you should upload an application/octet-stream file that is named with a .php.jpegd extension.
CVE-2020-10682 has a severity rating of 7.8, which is considered high.
To fix CVE-2020-10682, update CMS Made Simple to a version that is not affected by the vulnerability or apply the necessary patches provided by the vendor.