BigTree CMS BigTree CMS 4.2.22

CPE Details

BigTree CMS BigTree CMS 4.2.22
4.2.22
2019-05-14
16h22 +00:00
2019-05-14
16h22 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:bigtreecms:bigtree_cms:4.2.22:*:*:*:*:*:*:*

Informations

Vendor

bigtreecms

Product

bigtree_cms

Version

4.2.22

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-26670 2021-06-01 12h13 +00:00 A vulnerability has been discovered in BigTree CMS 4.4.10 and earlier which allows an authenticated attacker to execute arbitrary commands through a crafted request sent to the server via the 'Create a New Setting' function.
8.8
High
CVE-2020-26669 2021-06-01 12h13 +00:00 A stored cross-site scripting (XSS) vulnerability was discovered in BigTree CMS 4.4.10 and earlier which allows an authenticated attacker to execute arbitrary web scripts or HTML via the page content to site/index.php/admin/pages/update.
5.4
Medium
CVE-2020-26668 2021-06-01 12h13 +00:00 A SQL injection vulnerability was discovered in /core/feeds/custom.php in BigTree CMS 4.4.10 and earlier which allows an authenticated attacker to inject a malicious SQL query to the applications via the 'Create New Feed' function.
8.8
High
CVE-2018-18380 2018-10-19 18h00 +00:00 A Session Fixation issue was discovered in Bigtree before 4.2.24. admin.php accepts a user-provided PHP session ID instead of regenerating a new one after a user has logged in to the application. The Session Fixation could allow an attacker to hijack an admin session.
5.4
Medium
CVE-2018-10574 2018-04-30 20h00 +00:00 site/index.php/admin/trees/add/ in BigTree 4.2.22 and earlier allows remote attackers to upload and execute arbitrary PHP code because the BigTreeStorage class in core/inc/bigtree/apis/storage.php does not prevent uploads of .htaccess files.
9.8
Critical
CVE-2018-10183 2018-04-17 12h00 +00:00 An issue was discovered in BigTree 4.2.22. There is cross-site scripting (XSS) in /core/inc/lib/less.php/test/index.php because of a $_SERVER['REQUEST_URI'] echo, as demonstrated by the dir parameter in a file=charsets action.
6.1
Medium