Lucene search

K
cveJpcertCVE-2020-5639
HistoryDec 14, 2020 - 3:15 a.m.

CVE-2020-5639

2020-12-1403:15:13
CWE-22
jpcert
web.nvd.nist.gov
41
2
cve-2020-5639
filezen
directory traversal
vulnerability
remote attackers
arbitrary files
os command execution

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.007

Percentile

80.6%

Directory traversal vulnerability in FileZen versions from V3.0.0 to V4.2.2 allows remote attackers to upload an arbitrary file in a specific directory via unspecified vectors. As a result, an arbitrary OS command may be executed.

Affected configurations

Nvd
Vulners
Node
solitonfilezenRange3.0.04.2.2
VendorProductVersionCPE
solitonfilezen*cpe:2.3:a:soliton:filezen:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "FileZen",
    "vendor": "Soliton Systems K.K.",
    "versions": [
      {
        "status": "affected",
        "version": "versions from V3.0.0 to V4.2.2"
      }
    ]
  }
]

Social References

More

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.007

Percentile

80.6%

Related for CVE-2020-5639