A vulnerability was found in ZZCMS 2023 and classified as critical. This issue affects some unknown processing of the file 3/Ebak5.1/upload/ChangeTable.php. The manipulation of the argument savefilename leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://vuldb.com/?id.281561 | vdb entry permissions required technical description |
https://vuldb.com/?ctiid.281561 | signature permissions required |
https://vuldb.com/?submit.427136 | third party advisory |
https://github.com/LvZCh/zzcms2023/issues/5 | issue tracking exploit broken link |