An arbitrary file deletion vulnerability exists in the admin/del.php file at line 62 in ZZCMS 2023 and earlier. Due to insufficient validation and sanitization of user input for file paths, an attacker can exploit this vulnerability by using directory traversal techniques to delete arbitrary files on the server. This can lead to the deletion of critical files, potentially disrupting the normal operation of the system.
References
Configurations
History
21 Apr 2025, 14:57
Type | Values Removed | Values Added |
---|---|---|
First Time |
Zzcms zzcms
Zzcms |
|
References | () http://www.zzcms.net/about/download.html - Broken Link | |
References | () https://github.com/gkdgkd123/codeAudit/blob/main/CVE-2024-43011%20ZZCMS2023%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4%E6%BC%8F%E6%B4%9E.md - Broken Link | |
CPE | cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:* |
Information
Published : 2024-08-16 20:15
Updated : 2025-04-21 14:57
NVD link : CVE-2024-43011
Mitre link : CVE-2024-43011
CVE.ORG link : CVE-2024-43011
JSON object : View
Products Affected
zzcms
- zzcms
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')