Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 27 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 Jan 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hustoj
Hustoj hustoj |
|
| Vendors & Products |
Hustoj
Hustoj hustoj |
Tue, 27 Jan 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HUSTOF is an open source online judge based on PHP/C++/MySQL/Linux for ACM/ICPC and NOIP training. Prior to version 26.01.24, the problem_import_qduoj.php and problem_import_hoj.php modules fail to properly sanitize filenames within uploaded ZIP archives. Attackers can craft a malicious ZIP file containing files with path traversal sequences (e.g., ../../shell.php). When extracted by the server, this allows writing files to arbitrary locations in the web root, leading to Remote Code Execution (RCE). Version 26.01.24 contains a fix for the issue. | |
| Title | HUSTOJ has Arbitrary File Write (Zip Slip) in Problem Import Modules that leads to RCE | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-27T14:42:04.040Z
Reserved: 2026-01-23T00:38:20.547Z
Link: CVE-2026-24479
Updated: 2026-01-27T14:41:58.821Z
Status : Awaiting Analysis
Published: 2026-01-27T01:16:02.017
Modified: 2026-01-27T14:59:34.073
Link: CVE-2026-24479
No data.
OpenCVE Enrichment
Updated: 2026-01-27T09:02:58Z