CVE-2020-10963: FrozenNode Laravel-Administrator unrestricted file upload
7.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.95425%
CWE
Published
5/24/2022
Updated
4/23/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| frozennode/administrator | composer | <= 5.0.12 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability occurs at the admin/tips_image/image/file_upload endpoint which handles file uploads. While exact source code isn't available, the exploit requires: 1. Lack of proper file content validation (accepts PHP code in files with GIF headers) 2. Failure to properly validate/sanitize file extensions (.php allowed) 3. Storing uploaded files in web-accessible locations. The controller method handling this endpoint is directly responsible for these missing security checks, making it the primary vulnerable function. The high confidence comes from the well-documented exploit pattern matching CWE-434 and the specific attack vector described (PHP-in-GIF with .php extension).