إرسال #753441: Zhangzhou Douke Network Technology Co., Ltd. DouPHP v1.9 Remote Code Executionالمعلومات

عنوانZhangzhou Douke Network Technology Co., Ltd. DouPHP v1.9 Remote Code Execution
الوصفDuring the security assessment of "DouPHP CMS", I detected a critical Remote Code Execution vulnerability involving the "admin/file.php" and "admin/backup.php" files. This vulnerability is attributed to the insufficient validation of user input for the "sql_filename" parameter and the lack of secure ZIP extraction mechanisms. This inadequacy enables attackers to upload a crafted ZIP file containing a webshell and trigger its extraction to the web root. Consequently, attackers can execute arbitrary PHP code, modify or delete system files, and obtain sensitive information. Immediate corrective actions are essential to safeguard system security and uphold data integrity.
المصدر⚠️ https://github.com/pengchengwangli/MyCVE/issues/2
المستخدم
 pengroot (UID 90249)
ارسال06/02/2026 03:07 PM (3 أشهر منذ)
الاعتدال08/02/2026 05:10 PM (2 days later)
الحالةتمت الموافقة
إدخال VulDB344943 [DouPHP حتى 1.9 ZIP File /admin/file.php sql_filename تجاوز الصلاحيات]
النقاط20

Do you need the next level of professionalism?

Upgrade your account now!