Learn about CVE-2020-35656, a vulnerability in Jaws CMS allowing remote authenticated administrators to execute arbitrary code. Find out the impact, affected versions, and mitigation steps.
Jaws through 1.8.0 allows remote authenticated administrators to execute arbitrary code via crafted use of admin.php?reqGadget=Components&reqAction=InstallGadget&comp=FileBrowser and admin.php?reqGadget=FileBrowser&reqAction=Files to upload a .php file. This vulnerability is unrelated to the JAWS (Job Access With Speech) product.
Understanding CVE-2020-35656
This CVE identifies a security issue in Jaws CMS that enables remote authenticated administrators to execute arbitrary code.
What is CVE-2020-35656?
The vulnerability in Jaws CMS allows remote authenticated administrators to upload a .php file using specific URLs, leading to arbitrary code execution.
The Impact of CVE-2020-35656
The exploitation of this vulnerability can result in unauthorized code execution by authenticated administrators, potentially compromising the security and integrity of the system.
Technical Details of CVE-2020-35656
Jaws CMS through version 1.8.0 is susceptible to this security flaw.
Vulnerability Description
The issue arises from improper handling of file uploads through specific URLs, enabling the execution of arbitrary code.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by authenticated administrators using crafted URLs to upload malicious .php files, allowing them to execute arbitrary code.
Mitigation and Prevention
It is crucial to take immediate steps to address and prevent the exploitation of CVE-2020-35656.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates