{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-2115","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-03-08T07:30:43.570Z","datePublished":"2025-03-09T05:31:04.443Z","dateUpdated":"2025-03-10T15:46:17.501Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-03-09T05:31:04.443Z"},"title":"zzskzy Warehouse Refinement Management System AcceptZip.ashx ProcessRequest unrestricted upload","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-434","lang":"en","description":"Unrestricted Upload"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]}],"affected":[{"vendor":"zzskzy","product":"Warehouse Refinement Management System","versions":[{"version":"3.1","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, was found in zzskzy Warehouse Refinement Management System 3.1. Affected is the function ProcessRequest of the file /AcceptZip.ashx. The manipulation of the argument file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine Schwachstelle in zzskzy Warehouse Refinement Management System 3.1 gefunden. Sie wurde als kritisch eingestuft. Es betrifft die Funktion ProcessRequest der Datei /AcceptZip.ashx. Durch Manipulieren des Arguments file mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-03-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-03-08T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-03-08T08:35:46.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"heihei_XZ (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.299010","name":"VDB-299010 | zzskzy Warehouse Refinement Management System AcceptZip.ashx ProcessRequest unrestricted upload","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.299010","name":"VDB-299010 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.506655","name":"Submit #506655 | www.zzskzy.com Warehouse refinement management system v3.1 RCE","tags":["third-party-advisory"]},{"url":"https://github.com/heiheixz/report/blob/main/sk_1.md","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/heiheixz/report/blob/main/sk_1.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-10T15:45:59.060109Z","id":"CVE-2025-2115","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-10T15:46:17.501Z"}}]}}