A vulnerability was found in nc-cms 3.5 (Content Management System). It has been declared as critical. This vulnerability affects a code block in the library lib/NCCms.class.php. The manipulation of the argument name/editordata
as part of a Parameter leads to a privilege escalation vulnerability (File Upload). The CWE definition for the vulnerability is CWE-269. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
lib/NCCms.class.php in nc-cms 3.5 allows upload of .php files via the index.php?action=save name and editordata parameters.
The weakness was disclosed 02/11/2019. This vulnerability was named CVE-2019-7721 since 02/10/2019. There are known technical details, but no exploit is available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 02/11/2019).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
CPE
CVSSv3
VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.5
VulDB Base Score:
≈5.5VulDB Temp Score:
≈5.5VulDB Vector:
🔒VulDB Reliability:
🔍CVSSv2
VulDB Base Score:
🔒VulDB Temp Score:
🔒VulDB Reliability:
🔍Exploiting
Class: Privilege escalation / File Upload (
CWE-269)
Local: Yes
Remote: No
Availability:
🔒Price Prediction:
🔍Current Price Estimation:
🔒Threat Intelligence
Threat:
🔍Adversaries:
🔍Geopolitics:
🔍Economy:
🔍Predictions:
🔍Actions:
🔍Countermeasures
Recommended: no mitigation known
0-Day Time:
🔒Timeline
02/10/2019 CVE assigned02/11/2019 Advisory disclosed
02/11/2019 VulDB entry created02/11/2019 VulDB last updateSources
CVE:
CVE-2019-7721 (
🔒)
Entry
Created: 02/11/2019
Complete:
🔍Lien vers l'article source