Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXBxY2Ytdjh2NS1qbWNn
Zip slip in Microweber
A directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with file paths including relative paths (i.e., ../../), move this file into the backup directory, and execute a restore on this file.
Permalink: https://github.com/advisories/GHSA-pqcf-v8v5-jmcgJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXBxY2Ytdjh2NS1qbWNn
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 3 years ago
Updated: almost 2 years ago
CVSS Score: 7.2
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Percentage: 0.25628
EPSS Percentile: 0.96702
Identifiers: GHSA-pqcf-v8v5-jmcg, CVE-2020-28337
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-28337
- https://github.com/microweber/microweber/commit/777ee9c3e7519eb3672c79ac41066175b2001b50
- https://sl1nki.page/advisories/CVE-2020-28337
- https://sl1nki.page/blog/2021/02/01/microweber-zip-slip
- http://packetstormsecurity.com/files/162514/Microweber-CMS-1.1.20-Remote-Code-Execution.html
- https://github.com/advisories/GHSA-pqcf-v8v5-jmcg
Blast Radius: 5.0
Affected Packages
packagist:microweber/microweber
Dependent packages: 1Dependent repositories: 5
Downloads: 13,089 total
Affected Version Ranges: < 1.2.3
Fixed in: 1.2.3
All affected versions: 0.9.346, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7
All unaffected versions: 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.2.7, 1.2.8, 1.2.9, 1.2.10, 1.2.11, 1.2.12, 1.2.13, 1.2.14, 1.2.15, 1.2.16, 1.2.17, 1.2.18, 1.2.19, 1.2.20, 1.2.21, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.0.11, 2.0.12, 2.0.13, 2.0.14, 2.0.15, 2.0.16, 2.0.17