Description
Server-side request forgery in Wcms 0.3.2 let an attacker send crafted requests from the back-end server of a vulnerable web application via the pagename parameter to wex/html.php. It can help identify open ports, local network hosts and execute command on local services.
References
https://github.com/secwx/research/blob/main/cve/CVE-2020-24140.md
Third Party Advisory
https://github.com/vedees/wcms/issues/11
ExploitThird Party Advisory
https://github.com/secwx/research/blob/main/cve/CVE-2020-24140.md
Third Party Advisory
https://github.com/vedees/wcms/issues/11
ExploitThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
8.3 · High
Information
Source identifier
Vulnerability status
Modified
Published
2021-04-07T14:15:13.167Z
4 years agoLast modified
2024-11-21T04:14:25.490Z
1 year ago