U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2020-26255 Detail

Description

Kirby is a CMS. In Kirby CMS (getkirby/cms) before version 3.4.5, and Kirby Panel before version 2.5.14 , an editor with full access to the Kirby Panel can upload a PHP .phar file and execute it on the server. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users, as they can gain access to the server with such a Phar file. Visitors without Panel access *cannot* use this attack vector. The problem has been patched in Kirby 2.5.14 and Kirby 3.4.5. Please update to one of these or a later version to fix the vulnerability. Note: Kirby 2 reaches end of life on December 31, 2020. We therefore recommend to upgrade your Kirby 2 sites to Kirby 3. If you cannot upgrade, we still recommend to update to Kirby 2.5.14.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881 Patch  Third Party Advisory 
https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881 Patch  Third Party Advisory 
https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09 Patch  Third Party Advisory 
https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09 Patch  Third Party Advisory 
https://github.com/getkirby/kirby/releases/tag/3.4.5 Release Notes  Third Party Advisory 
https://github.com/getkirby/kirby/releases/tag/3.4.5 Release Notes  Third Party Advisory 
https://github.com/getkirby/kirby/security/advisories/GHSA-g3h8-cg9x-47qw Release Notes  Third Party Advisory 
https://github.com/getkirby/kirby/security/advisories/GHSA-g3h8-cg9x-47qw Release Notes  Third Party Advisory 
https://packagist.org/packages/getkirby/cms Product  Third Party Advisory 
https://packagist.org/packages/getkirby/cms Product  Third Party Advisory 
https://packagist.org/packages/getkirby/panel Product  Third Party Advisory 
https://packagist.org/packages/getkirby/panel Product  Third Party Advisory 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-434 Unrestricted Upload of File with Dangerous Type cwe source acceptance level NIST   GitHub, Inc.  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

3 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2020-26255
NVD Published Date:
12/08/2020
NVD Last Modified:
11/21/2024
Source:
GitHub, Inc.