提出 #753441: Zhangzhou Douke Network Technology Co., Ltd. DouPHP v1.9 Remote Code Execution情報

タイトルZhangzhou Douke Network Technology Co., Ltd. DouPHP v1.9 Remote Code Execution
説明During the security assessment of "DouPHP CMS", I detected a critical Remote Code Execution vulnerability involving the "admin/file.php" and "admin/backup.php" files. This vulnerability is attributed to the insufficient validation of user input for the "sql_filename" parameter and the lack of secure ZIP extraction mechanisms. This inadequacy enables attackers to upload a crafted ZIP file containing a webshell and trigger its extraction to the web root. Consequently, attackers can execute arbitrary PHP code, modify or delete system files, and obtain sensitive information. Immediate corrective actions are essential to safeguard system security and uphold data integrity.
ソース⚠️ https://github.com/pengchengwangli/MyCVE/issues/2
ユーザー
 pengroot (UID 90249)
送信2026年02月06日 15:07 (3 月 ago)
モデレーション2026年02月08日 17:10 (2 days later)
ステータス承諾済み
VulDBエントリ344943 [DouPHP 迄 1.9 ZIP File /admin/file.php sql_filename 特権昇格]
ポイント20

Do you want to use VulDB in your project?

Use the official API to access entries easily!