CVE-2022-24247
Published Apr 12, 2022
Last updated 3 years ago
Overview
- Description
- RiteCMS version 3.1.0 and below suffers from an arbitrary file overwrite via path traversal vulnerability in Admin Panel. Exploiting the vulnerability allows an authenticated attacker to overwrite any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to write) resulting a remote code execution.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 5.2
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 8.5
- Impact score
- 9.2
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-22
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ritecms:ritecms:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96E9607C-AAB1-429B-B214-C288509493AF", "versionEndIncluding": "3.1.0" } ], "operator": "OR" } ] } ]