CVE-2020-5593

8.8 HIGH

📋 TL;DR

CVE-2020-5593 is a PHP code injection vulnerability in Zenphoto CMS that allows attackers to execute arbitrary code by tricking users into uploading malicious .zip files. This affects all Zenphoto installations prior to version 1.5.7. The vulnerability can lead to complete system compromise if exploited successfully.

💻 Affected Systems

Products:
  • Zenphoto CMS
Versions: All versions prior to 1.5.7
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires file upload functionality to be enabled, which is common in Zenphoto installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete server takeover, data theft, and lateral movement within the network.

🟠

Likely Case

Attacker gains shell access to the web server, installs backdoors, and compromises the entire Zenphoto installation.

🟢

If Mitigated

Limited impact if file uploads are disabled or restricted to trusted users only.

🌐 Internet-Facing: HIGH - Web applications are directly accessible and attackers can craft malicious payloads.
🏢 Internal Only: MEDIUM - Requires user interaction but internal users could be tricked via phishing.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to get a user to upload the malicious .zip file. The technical exploit itself is straightforward once the file is uploaded.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.7

Vendor Advisory: https://www.zenphoto.org/news/zenphoto-1.5.7/

Restart Required: No

Instructions:

1. Backup your Zenphoto installation and database. 2. Download Zenphoto 1.5.7 or later from the official website. 3. Replace all files with the new version, preserving your configuration files. 4. Verify the installation works correctly.

🔧 Temporary Workarounds

Disable file uploads

all

Temporarily disable all file upload functionality in Zenphoto until patching is complete.

Edit Zenphoto configuration to remove upload permissions or disable relevant plugins

Restrict upload file types

linux

Configure web server to block .zip file uploads to Zenphoto directories.

Add to .htaccess: <FilesMatch "\.(zip)$">
  Order Allow,Deny
  Deny from all
</FilesMatch>

🧯 If You Can't Patch

  • Implement strict file upload validation at the web application firewall level
  • Isolate Zenphoto installation in a restricted network segment with no internet access

🔍 How to Verify

Check if Vulnerable:

Check Zenphoto version in admin dashboard or examine zp-core/version.php file for version number.

Check Version:

grep "ZENPHOTO_VERSION" zp-core/version.php

Verify Fix Applied:

Confirm version is 1.5.7 or higher in admin dashboard or version.php file.

📡 Detection & Monitoring

Log Indicators:

  • Unusual .zip file uploads to Zenphoto
  • PHP execution errors in web server logs
  • Suspicious file creation in upload directories

Network Indicators:

  • POST requests with .zip files to Zenphoto upload endpoints
  • Outbound connections from web server to unknown IPs

SIEM Query:

source="web_logs" AND (uri="/zenphoto/upload" OR uri="/zp-core/admin-upload.php") AND file_extension=".zip"

🔗 References

📤 Share & Export