{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T11:58:34.802","vulnerabilities":[{"cve":{"id":"CVE-2021-37770","sourceIdentifier":"cve@mitre.org","published":"2022-06-30T15:15:07.947","lastModified":"2024-11-21T06:15:53.220","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Nucleus CMS v3.71 is affected by a file upload vulnerability. In this vulnerability, we can use upload to change the upload path to the path without the Htaccess file. Upload an Htaccess file and write it to AddType application / x-httpd-php.jpg. In this way, an attacker can upload a picture with shell, treat it as PHP, execute commands, so as to take down website resources."},{"lang":"es","value":"Nucleus CMS versión v3.71, está afectado por una vulnerabilidad en la carga de archivos. En esta vulnerabilidad, podemos usar el upload para cambiar la ruta de subida a la ruta sin el archivo Htaccess. Subir un archivo Htaccess y escribirlo en la aplicación AddType / x-httpd-php.jpg. De esta manera, un atacante puede subir una imagen con el shell, tratarla como PHP, ejecutar comandos, con el fin de derribar los recursos del sitio web"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nucleuscms:nucleus_cms:3.71:*:*:*:*:*:*:*","matchCriteriaId":"4419BE1B-193F-4EB5-A88B-B20D647D0215"}]}]}],"references":[{"url":"https://github.com/NucleusCMS/NucleusCMS/issues/96","source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Third Party Advisory"]},{"url":"https://shimo.im/docs/Ch9CphJt8XwTvQ3d","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/NucleusCMS/NucleusCMS/issues/96","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Issue Tracking","Third Party Advisory"]},{"url":"https://shimo.im/docs/Ch9CphJt8XwTvQ3d","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}