CVE-2020-28687
📋 TL;DR
This vulnerability allows remote attackers to upload arbitrary files through the edit profile functionality in ARTWORKS GALLERY software. Attackers can upload malicious files like web shells to gain unauthorized access and control over affected systems. Anyone using ARTWORKS GALLERY 1.0 is affected.
💻 Affected Systems
- ARTWORKS GALLERY IN PHP, CSS, JAVASCRIPT, AND MYSQL
📦 What is this software?
Artworks Gallery In Php\, Css\, Javascript\, And Mysql by Artworks Gallery In Php\, Css\, Javascript\, And Mysql Project
View all CVEs affecting Artworks Gallery In Php\, Css\, Javascript\, And Mysql →
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise via remote code execution, data theft, defacement, and use as attack platform
Likely Case
Web shell upload leading to unauthorized access, file manipulation, and potential lateral movement
If Mitigated
Unauthorized file upload prevented, maintaining normal gallery functionality
🎯 Exploit Status
Public exploit code available on Packet Storm, requires no authentication
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Consider migrating to alternative gallery software or implementing workarounds.
🔧 Temporary Workarounds
File Upload Restriction
allImplement server-side file type validation and restrict uploads to specific extensions
Modify PHP upload handling to check file extensions and MIME types
Disable Edit Profile Functionality
allTemporarily disable the vulnerable edit profile feature
Comment out or remove edit profile functionality in PHP files
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block file uploads to edit profile endpoint
- Restrict network access to gallery application using firewall rules
🔍 How to Verify
Check if Vulnerable:
Attempt to upload a file with arbitrary extension through edit profile functionality
Check Version:
Check gallery software version in admin panel or configuration files
Verify Fix Applied:
Test that file uploads are properly validated and restricted
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to edit profile endpoint
- Files with suspicious extensions (.php, .exe) in upload directories
Network Indicators:
- POST requests to edit profile endpoint with file uploads
- Unusual outbound connections from web server
SIEM Query:
web_uri="/edit-profile" AND http_method=POST AND content_type CONTAINS "multipart/form-data"
🔗 References
- https://code-projects.org/artworks-gallery-in-php-css-javascript-and-mysql-free-download/
- https://packetstormsecurity.com/files/160095/Artworks-Gallery-1.0-Shell-Upload.html
- https://code-projects.org/artworks-gallery-in-php-css-javascript-and-mysql-free-download/
- https://packetstormsecurity.com/files/160095/Artworks-Gallery-1.0-Shell-Upload.html