Soumettre #794798: PublicCMS V6.202506.d Improper Handling of Highly Compressed Data (Data Amplification)information

TitrePublicCMS V6.202506.d Improper Handling of Highly Compressed Data (Data Amplification)
DescriptionPublicCMS (up to version [V6.202506.d]) is vulnerable to a Denial of Service (DoS) attack via a "ZIP Bomb" during document processing. In common/src/main/java/com/publiccms/common/tools/DocToHtmlUtils.java at line 94, the application explicitly disables the security threshold for compressed data expansion by calling ZipSecureFile.setMinInflateRatio(0), which bypasses the default protection of the Apache POI library. This vulnerable conversion logic is reachable via the administrative file import interface (docx/xlsx/ppt/pptx) defined in core/src/main/java/com/publiccms/controller/admin/sys/FileAdminController.java at lines 171-176 and 191-230. An authenticated attacker can upload a specially crafted malicious compressed document, triggering extreme CPU and memory consumption that leads to server instability or a complete crash.
Utilisateur
 LeyNn3H (UID 97009)
Soumission01/04/2026 18:42 (il y a 22 jours)
Modérer21/04/2026 16:35 (20 days later)
StatutAccepté
Entrée VulDB358491 [Sanluan PublicCMS jusqu’à 6.202506.d DocToHtmlUtils.java ZipSecureFile.setMinflateRatio déni de service]
Points17

Interested in the pricing of exploits?

See the underground prices here!