Search criteria
6 vulnerabilities found for soy_cms by brassica
CVE-2020-15189 (GCVE-0-2020-15189)
Vulnerability from nvd – Published: 2020-09-18 17:20 – Updated: 2024-08-04 13:08
VLAI?
Title
Remote Code Execution in SOY CMS
Summary
SOY CMS 3.0.2 and earlier is affected by Remote Code Execution (RCE) using Unrestricted File Upload. Cross-Site Scripting(XSS) vulnerability that was used in CVE-2020-15183 can be used to increase impact by redirecting the administrator to access a specially crafted page. This vulnerability is caused by insecure configuration in elFinder. This is fixed in version 3.0.2.328.
Severity ?
6.8 (Medium)
CWE
- CWE-434 - {"CWE-434":"Unrestricted Upload of File with Dangerous Type"}
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| inunosinsi | soycms |
Affected:
< 3.0.2.328
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T13:08:22.649Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-6r2f-p68g-m433"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/inunosinsi/soycms/issues/9"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/inunosinsi/soycms/pull/14"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/inunosinsi/soycms/pull/14/commits/e4ef00677ed52f9e5a5fcfcb56b797f5412b5d59"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://youtu.be/FWIDFNXmr9g"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "soycms",
"vendor": "inunosinsi",
"versions": [
{
"status": "affected",
"version": "\u003c 3.0.2.328"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "SOY CMS 3.0.2 and earlier is affected by Remote Code Execution (RCE) using Unrestricted File Upload. Cross-Site Scripting(XSS) vulnerability that was used in CVE-2020-15183 can be used to increase impact by redirecting the administrator to access a specially crafted page. This vulnerability is caused by insecure configuration in elFinder. This is fixed in version 3.0.2.328."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "{\"CWE-434\":\"Unrestricted Upload of File with Dangerous Type\"}",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-09-18T17:20:15",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-6r2f-p68g-m433"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/inunosinsi/soycms/issues/9"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/inunosinsi/soycms/pull/14"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/inunosinsi/soycms/pull/14/commits/e4ef00677ed52f9e5a5fcfcb56b797f5412b5d59"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://youtu.be/FWIDFNXmr9g"
}
],
"source": {
"advisory": "GHSA-6r2f-p68g-m433",
"discovery": "UNKNOWN"
},
"title": "Remote Code Execution in SOY CMS",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2020-15189",
"STATE": "PUBLIC",
"TITLE": "Remote Code Execution in SOY CMS"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "soycms",
"version": {
"version_data": [
{
"version_value": "\u003c 3.0.2.328"
}
]
}
}
]
},
"vendor_name": "inunosinsi"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SOY CMS 3.0.2 and earlier is affected by Remote Code Execution (RCE) using Unrestricted File Upload. Cross-Site Scripting(XSS) vulnerability that was used in CVE-2020-15183 can be used to increase impact by redirecting the administrator to access a specially crafted page. This vulnerability is caused by insecure configuration in elFinder. This is fixed in version 3.0.2.328."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "{\"CWE-434\":\"Unrestricted Upload of File with Dangerous Type\"}"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-6r2f-p68g-m433",
"refsource": "CONFIRM",
"url": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-6r2f-p68g-m433"
},
{
"name": "https://github.com/inunosinsi/soycms/issues/9",
"refsource": "MISC",
"url": "https://github.com/inunosinsi/soycms/issues/9"
},
{
"name": "https://github.com/inunosinsi/soycms/pull/14",
"refsource": "MISC",
"url": "https://github.com/inunosinsi/soycms/pull/14"
},
{
"name": "https://github.com/inunosinsi/soycms/pull/14/commits/e4ef00677ed52f9e5a5fcfcb56b797f5412b5d59",
"refsource": "MISC",
"url": "https://github.com/inunosinsi/soycms/pull/14/commits/e4ef00677ed52f9e5a5fcfcb56b797f5412b5d59"
},
{
"name": "https://youtu.be/FWIDFNXmr9g",
"refsource": "MISC",
"url": "https://youtu.be/FWIDFNXmr9g"
}
]
},
"source": {
"advisory": "GHSA-6r2f-p68g-m433",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2020-15189",
"datePublished": "2020-09-18T17:20:16",
"dateReserved": "2020-06-25T00:00:00",
"dateUpdated": "2024-08-04T13:08:22.649Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-15188 (GCVE-0-2020-15188)
Vulnerability from nvd – Published: 2020-09-18 17:05 – Updated: 2024-08-04 13:08
VLAI?
Title
Unauthenticated Remote Code Execution in SOY CMS
Summary
SOY CMS 3.0.2.327 and earlier is affected by Unauthenticated Remote Code Execution (RCE). The allows remote attackers to execute any arbitrary code when the inquiry form feature is enabled by the service. The vulnerability is caused by unserializing the form without any restrictions. This was fixed in 3.0.2.328.
Severity ?
10 (Critical)
CWE
- CWE-502 - {"CWE-502":"Deserialization of Untrusted Data"}
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| inunosinsi | soycms |
Affected:
< 3.0.2.328
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T13:08:22.678Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-hrrx-m22r-p9jp"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/inunosinsi/soycms/issues/10"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/inunosinsi/soycms/pull/12/commits/a75642989132dd25f74a13194b27c0986c3de020"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.youtube.com/watch?v=zAE4Swjc-GU\u0026feature=youtu.be"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "soycms",
"vendor": "inunosinsi",
"versions": [
{
"status": "affected",
"version": "\u003c 3.0.2.328"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "SOY CMS 3.0.2.327 and earlier is affected by Unauthenticated Remote Code Execution (RCE). The allows remote attackers to execute any arbitrary code when the inquiry form feature is enabled by the service. The vulnerability is caused by unserializing the form without any restrictions. This was fixed in 3.0.2.328."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "{\"CWE-502\":\"Deserialization of Untrusted Data\"}",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-09-18T17:05:18",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-hrrx-m22r-p9jp"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/inunosinsi/soycms/issues/10"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/inunosinsi/soycms/pull/12/commits/a75642989132dd25f74a13194b27c0986c3de020"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.youtube.com/watch?v=zAE4Swjc-GU\u0026feature=youtu.be"
}
],
"source": {
"advisory": "GHSA-hrrx-m22r-p9jp",
"discovery": "UNKNOWN"
},
"title": "Unauthenticated Remote Code Execution in SOY CMS",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2020-15188",
"STATE": "PUBLIC",
"TITLE": "Unauthenticated Remote Code Execution in SOY CMS"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "soycms",
"version": {
"version_data": [
{
"version_value": "\u003c 3.0.2.328"
}
]
}
}
]
},
"vendor_name": "inunosinsi"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SOY CMS 3.0.2.327 and earlier is affected by Unauthenticated Remote Code Execution (RCE). The allows remote attackers to execute any arbitrary code when the inquiry form feature is enabled by the service. The vulnerability is caused by unserializing the form without any restrictions. This was fixed in 3.0.2.328."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "{\"CWE-502\":\"Deserialization of Untrusted Data\"}"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-hrrx-m22r-p9jp",
"refsource": "CONFIRM",
"url": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-hrrx-m22r-p9jp"
},
{
"name": "https://github.com/inunosinsi/soycms/issues/10",
"refsource": "MISC",
"url": "https://github.com/inunosinsi/soycms/issues/10"
},
{
"name": "https://github.com/inunosinsi/soycms/pull/12/commits/a75642989132dd25f74a13194b27c0986c3de020",
"refsource": "MISC",
"url": "https://github.com/inunosinsi/soycms/pull/12/commits/a75642989132dd25f74a13194b27c0986c3de020"
},
{
"name": "https://www.youtube.com/watch?v=zAE4Swjc-GU\u0026feature=youtu.be",
"refsource": "MISC",
"url": "https://www.youtube.com/watch?v=zAE4Swjc-GU\u0026feature=youtu.be"
}
]
},
"source": {
"advisory": "GHSA-hrrx-m22r-p9jp",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2020-15188",
"datePublished": "2020-09-18T17:05:18",
"dateReserved": "2020-06-25T00:00:00",
"dateUpdated": "2024-08-04T13:08:22.678Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-11376 (GCVE-0-2019-11376)
Vulnerability from nvd – Published: 2019-04-20 14:35 – Updated: 2024-11-15 15:05 Disputed
VLAI?
Summary
SOY CMS v3.0.2 allows remote attackers to execute arbitrary PHP code via a <?php substring in the second text box. NOTE: the vendor indicates that there was an assumption that the content is "made editable on its own.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T22:48:09.204Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.iwantacve.cn/index.php/archives/212/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/inunosinsi/soycms/issues/5"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-11376",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-24T16:03:43.443590Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T15:05:29.929Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "SOY CMS v3.0.2 allows remote attackers to execute arbitrary PHP code via a \u003c?php substring in the second text box. NOTE: the vendor indicates that there was an assumption that the content is \"made editable on its own."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-04-20T14:35:52",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.iwantacve.cn/index.php/archives/212/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/inunosinsi/soycms/issues/5"
}
],
"tags": [
"disputed"
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-11376",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** DISPUTED ** SOY CMS v3.0.2 allows remote attackers to execute arbitrary PHP code via a \u003c?php substring in the second text box. NOTE: the vendor indicates that there was an assumption that the content is \"made editable on its own.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.iwantacve.cn/index.php/archives/212/",
"refsource": "MISC",
"url": "http://www.iwantacve.cn/index.php/archives/212/"
},
{
"name": "https://github.com/inunosinsi/soycms/issues/5",
"refsource": "MISC",
"url": "https://github.com/inunosinsi/soycms/issues/5"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-11376",
"datePublished": "2019-04-20T14:35:52",
"dateReserved": "2019-04-20T00:00:00",
"dateUpdated": "2024-11-15T15:05:29.929Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-15189 (GCVE-0-2020-15189)
Vulnerability from cvelistv5 – Published: 2020-09-18 17:20 – Updated: 2024-08-04 13:08
VLAI?
Title
Remote Code Execution in SOY CMS
Summary
SOY CMS 3.0.2 and earlier is affected by Remote Code Execution (RCE) using Unrestricted File Upload. Cross-Site Scripting(XSS) vulnerability that was used in CVE-2020-15183 can be used to increase impact by redirecting the administrator to access a specially crafted page. This vulnerability is caused by insecure configuration in elFinder. This is fixed in version 3.0.2.328.
Severity ?
6.8 (Medium)
CWE
- CWE-434 - {"CWE-434":"Unrestricted Upload of File with Dangerous Type"}
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| inunosinsi | soycms |
Affected:
< 3.0.2.328
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T13:08:22.649Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-6r2f-p68g-m433"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/inunosinsi/soycms/issues/9"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/inunosinsi/soycms/pull/14"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/inunosinsi/soycms/pull/14/commits/e4ef00677ed52f9e5a5fcfcb56b797f5412b5d59"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://youtu.be/FWIDFNXmr9g"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "soycms",
"vendor": "inunosinsi",
"versions": [
{
"status": "affected",
"version": "\u003c 3.0.2.328"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "SOY CMS 3.0.2 and earlier is affected by Remote Code Execution (RCE) using Unrestricted File Upload. Cross-Site Scripting(XSS) vulnerability that was used in CVE-2020-15183 can be used to increase impact by redirecting the administrator to access a specially crafted page. This vulnerability is caused by insecure configuration in elFinder. This is fixed in version 3.0.2.328."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "{\"CWE-434\":\"Unrestricted Upload of File with Dangerous Type\"}",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-09-18T17:20:15",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-6r2f-p68g-m433"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/inunosinsi/soycms/issues/9"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/inunosinsi/soycms/pull/14"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/inunosinsi/soycms/pull/14/commits/e4ef00677ed52f9e5a5fcfcb56b797f5412b5d59"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://youtu.be/FWIDFNXmr9g"
}
],
"source": {
"advisory": "GHSA-6r2f-p68g-m433",
"discovery": "UNKNOWN"
},
"title": "Remote Code Execution in SOY CMS",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2020-15189",
"STATE": "PUBLIC",
"TITLE": "Remote Code Execution in SOY CMS"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "soycms",
"version": {
"version_data": [
{
"version_value": "\u003c 3.0.2.328"
}
]
}
}
]
},
"vendor_name": "inunosinsi"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SOY CMS 3.0.2 and earlier is affected by Remote Code Execution (RCE) using Unrestricted File Upload. Cross-Site Scripting(XSS) vulnerability that was used in CVE-2020-15183 can be used to increase impact by redirecting the administrator to access a specially crafted page. This vulnerability is caused by insecure configuration in elFinder. This is fixed in version 3.0.2.328."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "{\"CWE-434\":\"Unrestricted Upload of File with Dangerous Type\"}"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-6r2f-p68g-m433",
"refsource": "CONFIRM",
"url": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-6r2f-p68g-m433"
},
{
"name": "https://github.com/inunosinsi/soycms/issues/9",
"refsource": "MISC",
"url": "https://github.com/inunosinsi/soycms/issues/9"
},
{
"name": "https://github.com/inunosinsi/soycms/pull/14",
"refsource": "MISC",
"url": "https://github.com/inunosinsi/soycms/pull/14"
},
{
"name": "https://github.com/inunosinsi/soycms/pull/14/commits/e4ef00677ed52f9e5a5fcfcb56b797f5412b5d59",
"refsource": "MISC",
"url": "https://github.com/inunosinsi/soycms/pull/14/commits/e4ef00677ed52f9e5a5fcfcb56b797f5412b5d59"
},
{
"name": "https://youtu.be/FWIDFNXmr9g",
"refsource": "MISC",
"url": "https://youtu.be/FWIDFNXmr9g"
}
]
},
"source": {
"advisory": "GHSA-6r2f-p68g-m433",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2020-15189",
"datePublished": "2020-09-18T17:20:16",
"dateReserved": "2020-06-25T00:00:00",
"dateUpdated": "2024-08-04T13:08:22.649Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-15188 (GCVE-0-2020-15188)
Vulnerability from cvelistv5 – Published: 2020-09-18 17:05 – Updated: 2024-08-04 13:08
VLAI?
Title
Unauthenticated Remote Code Execution in SOY CMS
Summary
SOY CMS 3.0.2.327 and earlier is affected by Unauthenticated Remote Code Execution (RCE). The allows remote attackers to execute any arbitrary code when the inquiry form feature is enabled by the service. The vulnerability is caused by unserializing the form without any restrictions. This was fixed in 3.0.2.328.
Severity ?
10 (Critical)
CWE
- CWE-502 - {"CWE-502":"Deserialization of Untrusted Data"}
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| inunosinsi | soycms |
Affected:
< 3.0.2.328
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T13:08:22.678Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-hrrx-m22r-p9jp"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/inunosinsi/soycms/issues/10"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/inunosinsi/soycms/pull/12/commits/a75642989132dd25f74a13194b27c0986c3de020"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.youtube.com/watch?v=zAE4Swjc-GU\u0026feature=youtu.be"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "soycms",
"vendor": "inunosinsi",
"versions": [
{
"status": "affected",
"version": "\u003c 3.0.2.328"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "SOY CMS 3.0.2.327 and earlier is affected by Unauthenticated Remote Code Execution (RCE). The allows remote attackers to execute any arbitrary code when the inquiry form feature is enabled by the service. The vulnerability is caused by unserializing the form without any restrictions. This was fixed in 3.0.2.328."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "{\"CWE-502\":\"Deserialization of Untrusted Data\"}",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-09-18T17:05:18",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-hrrx-m22r-p9jp"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/inunosinsi/soycms/issues/10"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/inunosinsi/soycms/pull/12/commits/a75642989132dd25f74a13194b27c0986c3de020"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.youtube.com/watch?v=zAE4Swjc-GU\u0026feature=youtu.be"
}
],
"source": {
"advisory": "GHSA-hrrx-m22r-p9jp",
"discovery": "UNKNOWN"
},
"title": "Unauthenticated Remote Code Execution in SOY CMS",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2020-15188",
"STATE": "PUBLIC",
"TITLE": "Unauthenticated Remote Code Execution in SOY CMS"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "soycms",
"version": {
"version_data": [
{
"version_value": "\u003c 3.0.2.328"
}
]
}
}
]
},
"vendor_name": "inunosinsi"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SOY CMS 3.0.2.327 and earlier is affected by Unauthenticated Remote Code Execution (RCE). The allows remote attackers to execute any arbitrary code when the inquiry form feature is enabled by the service. The vulnerability is caused by unserializing the form without any restrictions. This was fixed in 3.0.2.328."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "{\"CWE-502\":\"Deserialization of Untrusted Data\"}"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-hrrx-m22r-p9jp",
"refsource": "CONFIRM",
"url": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-hrrx-m22r-p9jp"
},
{
"name": "https://github.com/inunosinsi/soycms/issues/10",
"refsource": "MISC",
"url": "https://github.com/inunosinsi/soycms/issues/10"
},
{
"name": "https://github.com/inunosinsi/soycms/pull/12/commits/a75642989132dd25f74a13194b27c0986c3de020",
"refsource": "MISC",
"url": "https://github.com/inunosinsi/soycms/pull/12/commits/a75642989132dd25f74a13194b27c0986c3de020"
},
{
"name": "https://www.youtube.com/watch?v=zAE4Swjc-GU\u0026feature=youtu.be",
"refsource": "MISC",
"url": "https://www.youtube.com/watch?v=zAE4Swjc-GU\u0026feature=youtu.be"
}
]
},
"source": {
"advisory": "GHSA-hrrx-m22r-p9jp",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2020-15188",
"datePublished": "2020-09-18T17:05:18",
"dateReserved": "2020-06-25T00:00:00",
"dateUpdated": "2024-08-04T13:08:22.678Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-11376 (GCVE-0-2019-11376)
Vulnerability from cvelistv5 – Published: 2019-04-20 14:35 – Updated: 2024-11-15 15:05 Disputed
VLAI?
Summary
SOY CMS v3.0.2 allows remote attackers to execute arbitrary PHP code via a <?php substring in the second text box. NOTE: the vendor indicates that there was an assumption that the content is "made editable on its own.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T22:48:09.204Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.iwantacve.cn/index.php/archives/212/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/inunosinsi/soycms/issues/5"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-11376",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-24T16:03:43.443590Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T15:05:29.929Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "SOY CMS v3.0.2 allows remote attackers to execute arbitrary PHP code via a \u003c?php substring in the second text box. NOTE: the vendor indicates that there was an assumption that the content is \"made editable on its own."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-04-20T14:35:52",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.iwantacve.cn/index.php/archives/212/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/inunosinsi/soycms/issues/5"
}
],
"tags": [
"disputed"
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-11376",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** DISPUTED ** SOY CMS v3.0.2 allows remote attackers to execute arbitrary PHP code via a \u003c?php substring in the second text box. NOTE: the vendor indicates that there was an assumption that the content is \"made editable on its own.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.iwantacve.cn/index.php/archives/212/",
"refsource": "MISC",
"url": "http://www.iwantacve.cn/index.php/archives/212/"
},
{
"name": "https://github.com/inunosinsi/soycms/issues/5",
"refsource": "MISC",
"url": "https://github.com/inunosinsi/soycms/issues/5"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-11376",
"datePublished": "2019-04-20T14:35:52",
"dateReserved": "2019-04-20T00:00:00",
"dateUpdated": "2024-11-15T15:05:29.929Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}