Path Traversal Vulnerability in ZZCMS Web Content Management System
CVE-2024-7927
Key Information:
Badges
What is CVE-2024-7927?
A serious vulnerability has been identified in ZZCMS 2023, specifically within the file handling process at /admin/class.php?dowhat=modifyclass. This weakness arises from improper validation of user input within the argument skin[], which could lead to an exploitation method known as path traversal. This kind of exploit allows attackers to access unauthorized files and directories on the server, potentially disclosing sensitive information. The vulnerability can be triggered remotely, making it imperative for users and administrators of the affected ZZCMS product to implement immediate security measures. It is advisable to review system configurations and update to patched versions to mitigate potential risks.
Affected Version(s)
ZZCMS 2023
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.