Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-26255
HistoryDec 08, 2020 - 2:45 p.m.

CVE-2020-26255 PHP Phar archives could be uploaded and executed in Kirby

2020-12-0814:45:20
CWE-434
GitHub_M
www.cve.org
2
security vulnerability
php
.phar
upload
execution
kirby cms
patch
end of life
update
cve-2020-26255

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N

AI Score

9.4

Confidence

High

EPSS

0.002

Percentile

61.2%

Kirby is a CMS. In Kirby CMS (getkirby/cms) before version 3.4.5, and Kirby Panel before version 2.5.14 , an editor with full access to the Kirby Panel can upload a PHP .phar file and execute it on the server. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users, as they can gain access to the server with such a Phar file. Visitors without Panel access cannot use this attack vector. The problem has been patched in Kirby 2.5.14 and Kirby 3.4.5. Please update to one of these or a later version to fix the vulnerability. Note: Kirby 2 reaches end of life on December 31, 2020. We therefore recommend to upgrade your Kirby 2 sites to Kirby 3. If you cannot upgrade, we still recommend to update to Kirby 2.5.14.

CNA Affected

[
  {
    "product": "kirby",
    "vendor": "getkirby",
    "versions": [
      {
        "status": "affected",
        "version": "< 3.4.5"
      }
    ]
  }
]

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N

AI Score

9.4

Confidence

High

EPSS

0.002

Percentile

61.2%

Related for CVELIST:CVE-2020-26255