Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 02 Mar 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:hustoj:hustoj:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 27 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 Jan 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hustoj
Hustoj hustoj |
|
| Vendors & Products |
Hustoj
Hustoj hustoj |
Tue, 27 Jan 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HUSTOF is an open source online judge based on PHP/C++/MySQL/Linux for ACM/ICPC and NOIP training. Prior to version 26.01.24, the problem_import_qduoj.php and problem_import_hoj.php modules fail to properly sanitize filenames within uploaded ZIP archives. Attackers can craft a malicious ZIP file containing files with path traversal sequences (e.g., ../../shell.php). When extracted by the server, this allows writing files to arbitrary locations in the web root, leading to Remote Code Execution (RCE). Version 26.01.24 contains a fix for the issue. | |
| Title | HUSTOJ has Arbitrary File Write (Zip Slip) in Problem Import Modules that leads to RCE | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-27T14:42:04.040Z
Reserved: 2026-01-23T00:38:20.547Z
Link: CVE-2026-24479
Updated: 2026-01-27T14:41:58.821Z
Status : Analyzed
Published: 2026-01-27T01:16:02.017
Modified: 2026-03-02T21:32:57.010
Link: CVE-2026-24479
No data.
OpenCVE Enrichment
Updated: 2026-05-15T14:45:16Z