Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2018-6910 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: DedeCMS 5.7 suffers from an **Information Disclosure** vulnerability. πŸ“‰ **Consequences**: Attackers can retrieve the **full server file path** via direct requests to specific PHP files.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: The flaw lies in **improper error handling** or path exposure in `include/downmix.inc.php` and `inc/inc_archives_functions.php`.…

Q3Who is affected? (Versions/Components)

🎯 **Affected**: **Desdev DedeCMS** (Zhimeng CMS). πŸ“¦ **Version**: Specifically **Version 5.7**. 🌐 **Component**: The PHP CMS engine itself.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers Can**: Send direct HTTP requests to trigger errors. πŸ’Ύ **Data Leaked**: **Full absolute file paths** on the server. 🚫 **Note**: Data is limited to paths, not direct RCE or DB dump in this specific vector.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **LOW**. 🚫 **Auth Required**: **None**. 🌍 **Remote**: Yes, any remote attacker can exploit this without login credentials.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’₯ **Public Exp?**: **YES**. πŸ“œ **PoC**: Available via **Nuclei templates** (projectdiscovery) and GitHub repositories (kongxin520). πŸ”„ **Wild Exploitation**: High potential due to simplicity.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for direct requests to: 1. `/include/downmix.inc.php` 2. `/inc/inc_archives_functions.php`. πŸ‘€ **Indicator**: Look for **file path strings** in the HTTP response body.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: Data does **not** list a specific official patch version. πŸ“… **Published**: 2018-02-13. ⚠️ **Status**: Likely requires manual code modification or upgrading to a patched fork if available.

Q9What if no patch? (Workaround)

πŸ›‘οΈ **Workaround**: **Block access** to `downmix.inc.php` and `inc_archives_functions.php` via WAF or Web Server config (Nginx/Apache).…

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **MEDIUM-HIGH**. πŸ“‰ **Risk**: While it only leaks paths, this aids **further attacks** (like LFI or RCE). πŸƒ **Action**: Patch immediately if running DedeCMS 5.7.