Skip to main content

CVE-2024-0603: CWE-502 Deserialization in ZhiCms

High
VulnerabilityCVE-2024-0603cvecve-2024-0603cwe-502
Published: Tue Jan 16 2024 (01/16/2024, 22:00:07 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: ZhiCms

Description

A vulnerability classified as critical has been found in ZhiCms up to 4.0. This affects an unknown part of the file app/plug/controller/giftcontroller.php. The manipulation of the argument mylike leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250839.

AI-Powered Analysis

AILast updated: 07/03/2025, 16:42:58 UTC

Technical Analysis

CVE-2024-0603 is a critical deserialization vulnerability identified in ZhiCms version 4.0, specifically within the file app/plug/controller/giftcontroller.php. The vulnerability arises from unsafe deserialization triggered by manipulation of the 'mylike' argument. Deserialization vulnerabilities occur when untrusted input is deserialized without proper validation, allowing attackers to craft malicious payloads that can execute arbitrary code or manipulate application logic. In this case, the vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts confidentiality, integrity, and availability, with a CVSS score of 7.3 (high severity). Although no public exploits have been observed in the wild yet, the exploit details have been disclosed publicly, increasing the risk of exploitation. The vulnerability is classified under CWE-502, which refers to unsafe deserialization issues that can lead to remote code execution or other severe impacts. The affected component is part of a plugin controller, which suggests that the vulnerability could be leveraged to escalate privileges or compromise the web application hosting ZhiCms. Given the nature of the vulnerability, attackers could potentially execute arbitrary commands, manipulate data, or cause denial of service conditions remotely, posing a significant threat to affected systems.

Potential Impact

For European organizations using ZhiCms 4.0, this vulnerability presents a substantial risk. Successful exploitation could lead to unauthorized access, data leakage, or service disruption, impacting business continuity and data privacy compliance obligations such as GDPR. Organizations operating websites or services based on ZhiCms may face reputational damage and regulatory penalties if sensitive customer or operational data is compromised. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, especially in environments where ZhiCms is exposed to the internet without adequate network protections. Additionally, the lack of available patches or mitigations at the time of disclosure means organizations must act swiftly to implement compensating controls. The vulnerability could also be leveraged as a foothold for further lateral movement within corporate networks, amplifying the potential damage. Given the criticality and ease of exploitation, European entities relying on this CMS should prioritize risk assessment and remediation to prevent exploitation.

Mitigation Recommendations

1. Immediate mitigation should include restricting external access to the vulnerable component, such as limiting access to the giftcontroller.php endpoint via web application firewalls (WAFs) or network-level controls. 2. Implement input validation and sanitization to prevent malicious serialized data from being processed. 3. Monitor web server and application logs for unusual or suspicious requests targeting the 'mylike' parameter. 4. If possible, disable or remove the vulnerable plugin or module until a vendor patch or official fix is released. 5. Employ runtime application self-protection (RASP) tools that can detect and block deserialization attacks. 6. Conduct thorough code reviews and security testing on all deserialization logic within the application to identify and remediate unsafe practices. 7. Maintain up-to-date backups and incident response plans to quickly recover in case of compromise. 8. Engage with the ZhiCms community or vendor for updates on patches or security advisories and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-16T15:41:44.262Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dbfa6182aa0cae2498304

Added to database: 6/2/2025, 3:13:42 PM

Last enriched: 7/3/2025, 4:42:58 PM

Last updated: 8/17/2025, 9:52:26 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats