cve/2020/CVE-2020-15182.md

20 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-15182](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15182)
![](https://img.shields.io/static/v1?label=Product&message=soycms&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
### Description
The SOY Inquiry component of SOY CMS is affected by Cross-site Request Forgery (CSRF) and Remote Code Execution (RCE). The vulnerability affects versions 2.0.0.3 and earlier of SOY Inquiry. This allows remote attackers to force the administrator to edit files once the administrator loads a specially crafted webpage. An administrator must be logged in for exploitation to be possible. This issue is fixed in SOY Inquiry version 2.0.0.4 and included in SOY CMS 3.0.2.328.
### POC
#### Reference
- https://youtu.be/ffvKH3gwyRE
2024-06-09 00:33:16 +00:00
- https://youtu.be/ffvKH3gwyRE
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.