First published: Mon Feb 15 2021(Updated: )
A directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with file paths including relative paths (i.e., ../../), move this file into the backup directory, and execute a restore on this file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microweber WHMCS | <=1.1.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28337 has been classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2020-28337, update Microweber to version 1.1.21 or later.
CVE-2020-28337 affects Microweber versions up to and including 1.1.20.
Only authenticated users with administrative privileges can exploit CVE-2020-28337.
CVE-2020-28337 allows an authenticated attacker to execute arbitrary code via a directory traversal attack during the backup restore process.