CVE-2020-26806

admin/file.do in ObjectPlanet Opinio before 7.15 allows Unrestricted File Upload of executable JSP files, resulting in remote code execution, because filePath can have directory traversal and fileContent can be valid JSP code.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:objectplanet:opinio:*:*:*:*:*:*:*:*

History

09 Aug 2021, 19:00

Type Values Removed Values Added
CWE CWE-434
CPE cpe:2.3:a:objectplanet:opinio:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 8.8
References (MISC) https://packetstormsecurity.com/files/163709/ObjectPlanet-Opinio-7.13-Shell-Upload.html - (MISC) https://packetstormsecurity.com/files/163709/ObjectPlanet-Opinio-7.13-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry
References (CONFIRM) https://www.objectplanet.com/opinio/changelog.html - (CONFIRM) https://www.objectplanet.com/opinio/changelog.html - Release Notes, Vendor Advisory

31 Jul 2021, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-31 17:15

Updated : 2023-12-10 13:55


NVD link : CVE-2020-26806

Mitre link : CVE-2020-26806

CVE.ORG link : CVE-2020-26806


JSON object : View

Products Affected

objectplanet

  • opinio
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')