Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-49317: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ZIPANG Point Maker

0
Unknown
VulnerabilityCVE-2024-49317cvecve-2024-49317
Published: Thu Oct 17 2024 (10/17/2024, 17:13:36 UTC)
Source: CVE Database V5
Vendor/Project: ZIPANG
Product: Point Maker

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ZIPANG Point Maker point-maker allows PHP Local File Inclusion.This issue affects Point Maker: from n/a through <= 0.1.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 07:00:46 UTC

Technical Analysis

CVE-2024-49317 identifies a Local File Inclusion (LFI) vulnerability in the ZIPANG Point Maker software, specifically in versions up to 0.1.4. The vulnerability stems from improper control of the filename parameter used in PHP include or require statements. In PHP, these functions are used to incorporate and execute code from external files. If an attacker can manipulate the filename parameter without proper validation or sanitization, they can cause the application to include unintended files from the local filesystem. This can lead to disclosure of sensitive files such as configuration files, source code, or system files, and in some cases, it can be leveraged to execute arbitrary code if combined with other vulnerabilities or writable file locations. The vulnerability is classified as a Local File Inclusion rather than Remote File Inclusion, indicating that the attacker can only include files present on the server, not remote files. The affected product, ZIPANG Point Maker, is a PHP-based application, and the flaw exists due to insufficient input validation in the code handling file inclusion. No CVSS score has been assigned yet, and no public exploits are known at this time. However, the vulnerability is publicly disclosed and should be considered for immediate remediation. The lack of patches or official fixes at the time of disclosure increases the risk for organizations using this software. The vulnerability is particularly dangerous because it does not require authentication or user interaction, making automated exploitation feasible if the application is internet-facing.

Potential Impact

The impact of CVE-2024-49317 can be severe for organizations using ZIPANG Point Maker, especially if the application is exposed to the internet. Successful exploitation allows attackers to read sensitive files on the server, potentially exposing credentials, configuration details, or proprietary information. In some scenarios, attackers might chain this vulnerability with others to achieve remote code execution, leading to full system compromise. This can result in data breaches, service disruption, and loss of trust. Organizations in sectors handling sensitive data such as finance, healthcare, and government are particularly at risk. Additionally, the vulnerability can be used to pivot within internal networks if exploited in intranet environments. The absence of authentication requirements and user interaction lowers the barrier for exploitation, increasing the likelihood of attacks. The overall availability of the service can also be impacted if attackers use the vulnerability to disrupt normal operations or deploy ransomware. Given the widespread use of PHP applications globally, the scope of affected systems could be significant if ZIPANG Point Maker is widely deployed.

Mitigation Recommendations

To mitigate CVE-2024-49317, organizations should first check for any official patches or updates from ZIPANG and apply them promptly once available. In the absence of patches, immediate steps include implementing strict input validation and sanitization on all parameters used in include or require statements to ensure only intended files can be included. Employ whitelisting techniques to restrict file paths and names to known safe values. Disable PHP functions that allow dynamic file inclusion if not necessary, such as include, require, include_once, and require_once, or use safer alternatives. Configure web server permissions to restrict access to sensitive files and directories, minimizing the impact of potential LFI exploitation. Employ Web Application Firewalls (WAFs) with rules designed to detect and block suspicious file inclusion attempts. Conduct thorough code reviews and security testing focusing on file inclusion logic. Monitor logs for unusual file access patterns and implement intrusion detection systems to alert on potential exploitation attempts. Finally, consider isolating the application environment to limit the damage scope if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-10-14T10:40:30.894Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd74cce6bfc5ba1defdbc5

Added to database: 4/1/2026, 7:41:00 PM

Last enriched: 4/2/2026, 7:00:46 AM

Last updated: 4/4/2026, 8:34:18 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses