CVE-2023-50104

9.8 CRITICAL

📋 TL;DR

ZZCMS 2023 has an unauthenticated file upload vulnerability that allows attackers to upload malicious files and execute arbitrary code on the server. This affects all systems running ZZCMS 2023 with the vulnerable upload component accessible. Attackers can gain complete control of affected servers.

💻 Affected Systems

Products:
  • ZZCMS
Versions: 2023 version (specifically 3/E_bak5.1 component)
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the upload/index.php file within the 3/E_bak5.1 directory structure.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise leading to data theft, ransomware deployment, lateral movement within network, and persistent backdoor installation.

🟠

Likely Case

Webshell upload leading to server control, data exfiltration, and use as pivot point for further attacks.

🟢

If Mitigated

Attack blocked at WAF/web application firewall level; no successful exploitation.

🌐 Internet-Facing: HIGH - Directly exploitable via HTTP requests without authentication.
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request with malicious file upload; exploit code available in public repositories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check vendor website for security updates. 2. If patch available, download and apply. 3. Remove vulnerable upload/index.php file if not needed. 4. Test functionality after changes.

🔧 Temporary Workarounds

Remove vulnerable upload endpoint

linux

Delete or restrict access to the vulnerable upload/index.php file

rm /path/to/3/E_bak5.1/upload/index.php

Implement file upload restrictions

all

Add server-side validation for file uploads (extension, MIME type, size)

🧯 If You Can't Patch

  • Implement strict WAF rules to block file uploads to vulnerable endpoint
  • Restrict network access to ZZCMS administration interfaces using firewall rules

🔍 How to Verify

Check if Vulnerable:

Check if file exists: /3/E_bak5.1/upload/index.php and test if it accepts file uploads without proper validation.

Check Version:

Check ZZCMS version in admin panel or read version files in installation directory.

Verify Fix Applied:

Attempt to upload a test file (e.g., .php file) to the endpoint; should be rejected with proper error.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /3/E_bak5.1/upload/index.php with file uploads
  • Unusual file creations in upload directories
  • Webshell-like file names (.php, .jsp, .asp) in upload folders

Network Indicators:

  • Unusual outbound connections from web server
  • Large file uploads to vulnerable endpoint
  • POST requests with suspicious file extensions

SIEM Query:

source="web_logs" AND (uri="/3/E_bak5.1/upload/index.php" OR uri LIKE "%/upload/%") AND method="POST" AND (file_ext=".php" OR file_ext=".jsp" OR file_ext=".asp")

🔗 References

📤 Share & Export