
Cloud Vulnerability DB
A community-led vulnerabilities database
DNN (formerly DotNetNuke) through 9.4.4 allows Path Traversal vulnerability, identified as CVE-2020-5187. This vulnerability was discovered in the zip file extraction functionality of DNN's file upload feature and was reported in February 2020 (Medium Blog).
The vulnerability is a directory traversal attack, also known as a Zip Slip vulnerability, that exploits insufficient validation of directory names during archive extraction. The vulnerability affects the zip file extraction function in DNN's file upload feature, allowing attackers to potentially overwrite files with specific extensions on the system (Medium Blog).
An attacker could exploit this vulnerability to replace files with specific extensions on the system, including jpg, jpeg, jpe, gif, bmp, png, svg, ttf, eot, woff, doc, docx, xls, xlsx, ppt, pptx, pdf, txt, xml, xsl, xsd, css, zip, rar, template, htmtemplate, ico, avi, mpg, mpeg, mp3, wmv, mov, wav, mp4, webm, and ogv files. This could potentially lead to unauthorized file access and system compromise (Medium Blog).
The vulnerability was patched in DNN Platform version 9.5.0-rc0001. Users should upgrade to this version or later to mitigate the risk (Medium Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."