dzzoffice 2.02.1 is vulnerable to Directory Traversal via user/space/about.php.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize 'dir\..\..\filename' (multiple internal backslash dot dot) sequences that can resolve to a location that is outside of that directory.