CVE-2024-10293

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in ZZCMS 2023 allows remote attackers to upload arbitrary files without restrictions via the Ebak_SetGotoPak function. Attackers can exploit this to upload malicious files like webshells, potentially gaining full control of affected systems. All installations of ZZCMS 2023 with the vulnerable component are affected.

💻 Affected Systems

Products:
  • ZZCMS
Versions: 2023 version
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the vulnerable functions.php file to be present and accessible

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via webshell upload leading to data theft, ransomware deployment, or use as attack platform

🟠

Likely Case

Webshell installation enabling persistent backdoor access and lateral movement within the network

🟢

If Mitigated

File upload attempts blocked or logged with no successful exploitation

🌐 Internet-Facing: HIGH - Remote exploitation possible without authentication
🏢 Internal Only: MEDIUM - Still exploitable from internal networks but attack surface reduced

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on GitHub, making trivial exploitation likely

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or applying manual fixes.

🔧 Temporary Workarounds

Restrict file upload directory permissions

linux

Set upload directory to read-only for web server user

chmod 555 /path/to/upload/directory
chown root:root /path/to/upload/directory

Web Application Firewall rule

all

Block requests to vulnerable endpoint

# Example mod_security rule: SecRule REQUEST_URI "@contains /3/Ebbak5.1/upload/class/functions.php" "id:1001,phase:1,deny"

🧯 If You Can't Patch

  • Remove or rename the vulnerable functions.php file: mv /path/to/functions.php /path/to/functions.php.disabled
  • Implement strict file upload validation: only allow specific file types and scan all uploads with antivirus

🔍 How to Verify

Check if Vulnerable:

Check if file exists: /3/Ebbak5.1/upload/class/functions.php and contains Ebak_SetGotoPak function

Check Version:

Check ZZCMS version in admin panel or configuration files

Verify Fix Applied:

Verify functions.php is removed/renamed or file upload restrictions are properly implemented

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /3/Ebbak5.1/upload/class/functions.php
  • POST requests with file parameters to vulnerable endpoint
  • Webshell file creation in upload directories

Network Indicators:

  • HTTP requests containing 'Ebak_SetGotoPak' parameter
  • File uploads with unusual extensions (.php, .jsp, .asp) to CMS

SIEM Query:

source="web_logs" AND (uri="*functions.php*" AND method="POST" AND params="*file*")

🔗 References

📤 Share & Export