CVE-2024-10292

A vulnerability was found in ZZCMS 2023 and classified as critical. This issue affects some unknown processing of the file 3/Ebak5.1/upload/ChangeTable.php. The manipulation of the argument savefilename leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/LvZCh/zzcms2023/issues/5 Broken Link
https://vuldb.com/?ctiid.281561 Permissions Required
https://vuldb.com/?id.281561 Permissions Required
https://vuldb.com/?submit.427136 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:zzcms:zzcms:2023:*:*:*:*:*:*:*

History

30 Oct 2024, 13:40

Type Values Removed Values Added
CPE cpe:2.3:a:zzcms:zzcms:2023:*:*:*:*:*:*:*
References () https://github.com/LvZCh/zzcms2023/issues/5 - () https://github.com/LvZCh/zzcms2023/issues/5 - Broken Link
References () https://vuldb.com/?ctiid.281561 - () https://vuldb.com/?ctiid.281561 - Permissions Required
References () https://vuldb.com/?id.281561 - () https://vuldb.com/?id.281561 - Permissions Required
References () https://vuldb.com/?submit.427136 - () https://vuldb.com/?submit.427136 - Third Party Advisory
First Time Zzcms
Zzcms zzcms
CVSS v2 : 6.5
v3 : 6.3
v2 : 6.5
v3 : 9.8

25 Oct 2024, 12:56

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad en ZZCMS 2023 y se ha clasificado como crítica. Este problema afecta a algunos procesos desconocidos del archivo 3/Ebak5.1/upload/ChangeTable.php. La manipulación del argumento savefilename provoca una carga sin restricciones. El ataque puede iniciarse de forma remota. El exploit se ha hecho público y puede utilizarse.

23 Oct 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-23 16:15

Updated : 2024-10-30 13:40


NVD link : CVE-2024-10292

Mitre link : CVE-2024-10292

CVE.ORG link : CVE-2024-10292


JSON object : View

Products Affected

zzcms

  • zzcms
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type