First published: Tue Aug 18 2020(Updated: )
An issue was discovered in RiteCMS 2.2.1. An authenticated user can directly execute system commands by uploading a php web shell in the "Filemanager" section.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RiteCMS | =2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-23934 is critical with a CVSS score of 8.8.
CVE-2020-23934 affects RiteCMS version 2.2.1.
CVE-2020-23934 allows an authenticated user to execute system commands by uploading a PHP web shell in the 'Filemanager' section of RiteCMS.
To fix CVE-2020-23934, it is recommended to upgrade to a patched version of RiteCMS or apply any available security patches provided by the vendor.
More information about CVE-2020-23934 can be found at the following references: [GitHub](https://github.com/enesozeser/Vulnerabilities/blob/master/CVE-2020-23934), [Exploit-DB](https://www.exploit-db.com/exploits/48636).