Home

Description

HUSTOF is an open source online judge based on PHP/C++/MySQL/Linux for ACM/ICPC and NOIP training. Prior to version 26.01.24, the problem_import_qduoj.php and problem_import_hoj.php modules fail to properly sanitize filenames within uploaded ZIP archives. Attackers can craft a malicious ZIP file containing files with path traversal sequences (e.g., ../../shell.php). When extracted by the server, this allows writing files to arbitrary locations in the web root, leading to Remote Code Execution (RCE). Version 26.01.24 contains a fix for the issue.

PUBLISHED Reserved 2026-01-23 | Published 2026-01-27 | Updated 2026-01-27 | Assigner GitHub_M




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 26.01.24
affected

References

github.com/...hustoj/security/advisories/GHSA-xmgg-2rw4-7fxj

github.com/...ommit/902bd09e6d0011fe89cd84d4236899314b33101f

cve.org (CVE-2026-24479)

nvd.nist.gov (CVE-2026-24479)

Download JSON