漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Emlog: Path Traversal in emUnZip() allows arbitrary file write leading to RCE
Vulnerability Description
Emlog is an open source website building system. In versions 2.6.2 and prior, a path traversal vulnerability exists in the emUnZip() function (include/lib/common.php:793). When extracting ZIP archives (plugin/template uploads, backup imports), the function calls $zip->extractTo($path) without sanitizing ZIP entry names. An authenticated admin can upload a crafted ZIP containing entries with ../ sequences to write arbitrary files to the server filesystem, including PHP webshells, achieving Remote Code Execution (RCE). At time of publication, there are no publicly available patches.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
emlog 安全漏洞
Vulnerability Description
emlog是emlog开源的一套基于PHP和MySQL的CMS建站系统。 Emlog 2.6.2及之前版本存在安全漏洞,该漏洞源于emUnZip函数存在路径遍历,可能导致任意文件写入和远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A