Description
Zomplog 3.9 contains a remote code execution vulnerability that allows authenticated attackers to inject and execute arbitrary PHP code through file manipulation endpoints. Attackers can upload malicious JavaScript files, rename them to PHP, and execute system commands by exploiting the saveE and rename actions in the application.
Problem types
Improper Control of Generation of Code ('Code Injection')
Product status
Credits
Mirabbas Ağalarov
References
www.exploit-db.com/exploits/51624
www.exploit-db.com/exploits/51624 (ExploitDB-51624)
web.archive.org/web/20080616153330/http://zomp.nl/zomplog/ (Zomplog Archived Product Webpage)
www.vulncheck.com/...ion-via-authenticated-file-manipulation (VulnCheck Advisory: Zomplog 3.9 Remote Code Execution via Authenticated File Manipulation)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.