Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-12800

EPSS 93.88% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-12800

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution by setting supported_type to php% and uploading a .php% file.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
WordPress Drag and Drop Multi File Upload - Contact Form 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。Drag and Drop Multi File Upload - Contact Form是使用在其中的一个拖放式文件上传和联系表单插件。 WordPress Drag and Drop Multi File Upload - Contact Form 7 1.3.3.3之前版本中存在安全漏洞。攻击者可通过将supported_type设置为php%利用该漏洞上传ph
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-12800

#POC DescriptionSource LinkShenlong Link
1POC Script for CVE-2020-12800: RCE through Unrestricted File Type Upload https://github.com/amartinsec/CVE-2020-12800POC Details
2WordPress Contact Form 7 before 1.3.3.3 allows unrestricted file upload and remote code execution by setting supported_type to php% and uploading a .php% file. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-12800.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-12800

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-06-08 · 24 CVEs total

CVE-2020-13625PHPMailer 安全漏洞
CVE-2020-12049D-BUS 安全漏洞
CVE-2020-8172Joyent Node.js 信任管理问题漏洞
CVE-2020-8180Nextcloud Talk 代码注入漏洞
CVE-2020-6109Zoom Client 路径遍历漏洞
CVE-2020-6110Zoom Client 路径遍历漏洞
CVE-2020-7676AngularJS 跨站脚本漏洞
CVE-2020-9099多款Huawei产品授权问题漏洞
CVE-2020-9042Couchbase Server 跨站请求伪造漏洞
CVE-2020-9041Couchbase Sync Gateway和Couchbase Server 安全漏洞
CVE-2020-9040Couchbase Server Java SDK 信任管理问题漏洞
CVE-2020-13866Qbik IP Management WinGate 安全漏洞
CVE-2020-13962Digia Qt和Mumble 安全漏洞
CVE-2020-5304WhiteSource Software Application Vulnerability Management 注入漏洞
CVE-2020-8954OpenSearch Web browser 安全漏洞
CVE-2020-13696LinuxTV xawtv 安全漏洞
CVE-2020-12695UPnP 安全漏洞
CVE-2020-13432rejetto HFS 缓冲区错误漏洞
CVE-2020-13428VideoLAN VLC media player 缓冲区错误漏洞
CVE-2020-13885Citrix Systems Workspace App 安全漏洞

Showing top 20 of 24 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-12800

No comments yet


Leave a comment