CVE-2024-44820

6.1 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to access sensitive PHP environment information by visiting a specific URL with a query parameter. It affects ZZCMS v.2023 and earlier versions. The exposed information can help attackers plan further attacks against the system.

💻 Affected Systems

Products:
  • ZZCMS
Versions: v.2023 and earlier
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation path /3/E_bak5.1/upload/eginfo.php

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain detailed server configuration, environment variables, and system information that enables targeted attacks like privilege escalation, SQL injection, or remote code execution.

🟠

Likely Case

Attackers gather reconnaissance data about the PHP environment, server configuration, and installed modules to identify other vulnerabilities for exploitation.

🟢

If Mitigated

With proper access controls and file permissions, the exposure is limited to information disclosure without enabling immediate system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only web browser access to the vulnerable URL with the phome=ShowPHPInfo parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check vendor website for security updates. 2. If patch available, download and apply according to vendor instructions. 3. Remove or secure the vulnerable eginfo.php file.

🔧 Temporary Workarounds

Remove vulnerable file

linux

Delete or rename the vulnerable eginfo.php file to prevent access

rm /path/to/3/E_bak5.1/upload/eginfo.php
mv /path/to/3/E_bak5.1/upload/eginfo.php /path/to/3/E_bak5.1/upload/eginfo.php.bak

Restrict file access

all

Configure web server to deny access to the vulnerable file

Add to .htaccess: <Files "eginfo.php">
    Order Allow,Deny
    Deny from all
</Files>

🧯 If You Can't Patch

  • Implement strict access controls to block external access to the /3/E_bak5.1/upload/ directory
  • Deploy web application firewall rules to block requests containing 'phome=ShowPHPInfo' parameter

🔍 How to Verify

Check if Vulnerable:

Access http://[target]/3/E_bak5.1/upload/eginfo.php?phome=ShowPHPInfo and check if PHP information page loads

Check Version:

Check ZZCMS version in admin panel or configuration files

Verify Fix Applied:

Attempt to access the vulnerable URL and verify it returns 404 error or access denied

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to /3/E_bak5.1/upload/eginfo.php with phome=ShowPHPInfo parameter
  • Unusual access to backup directories

Network Indicators:

  • HTTP requests to unusual paths containing 'E_bak5.1' and 'eginfo.php'

SIEM Query:

source="web_logs" AND uri="/3/E_bak5.1/upload/eginfo.php" AND query="*phome=ShowPHPInfo*"

🔗 References

📤 Share & Export