Enviar #794798: PublicCMS V6.202506.d Improper Handling of Highly Compressed Data (Data Amplification)información

TítuloPublicCMS V6.202506.d Improper Handling of Highly Compressed Data (Data Amplification)
DescripciónPublicCMS (up to version [V6.202506.d]) is vulnerable to a Denial of Service (DoS) attack via a "ZIP Bomb" during document processing. In common/src/main/java/com/publiccms/common/tools/DocToHtmlUtils.java at line 94, the application explicitly disables the security threshold for compressed data expansion by calling ZipSecureFile.setMinInflateRatio(0), which bypasses the default protection of the Apache POI library. This vulnerable conversion logic is reachable via the administrative file import interface (docx/xlsx/ppt/pptx) defined in core/src/main/java/com/publiccms/controller/admin/sys/FileAdminController.java at lines 171-176 and 191-230. An authenticated attacker can upload a specially crafted malicious compressed document, triggering extreme CPU and memory consumption that leads to server instability or a complete crash.
Usuario
 LeyNn3H (UID 97009)
Sumisión2026-04-01 18:42 (hace 21 días)
Moderación2026-04-21 16:35 (20 days later)
EstadoAceptado
Entrada de VulDB358491 [Sanluan PublicCMS hasta 6.202506.d DocToHtmlUtils.java ZipSecureFile.setMinflateRatio denegación de servicio]
Puntos17

Want to know what is going to be exploited?

We predict KEV entries!