First published: Wed Oct 23 2024(Updated: )
A vulnerability was found in ZZCMS 2023. It has been classified as critical. Affected is the function Ebak_SetGotoPak of the file 3/Ebbak5.1/upload/class/functions.php. The manipulation of the argument file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
ZZCMS | =2023 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10293 has been classified as a critical vulnerability.
CVE-2024-10293 allows for unrestricted file upload due to a vulnerability in the Ebak_SetGotoPak function.
Yes, CVE-2024-10293 can be exploited remotely.
The function Ebak_SetGotoPak in the file functions.php is vulnerable in CVE-2024-10293.
It is recommended to apply the latest security patch from ZZCMS or implement strict file upload validations to mitigate CVE-2024-10293.