HUSTOF is an open source online judge based on PHP/C++/MySQL/Linux for ACM/ICPC and NOIP training. Prior to version 26.01.24, the problem_import_qduoj.php and problem_import_hoj.php modules fail to properly sanitize filenames within uploaded ZIP archives. Attackers can craft a malicious ZIP file containing files with path traversal sequences (e.g., ../../shell.php). When extracted by the server, this allows writing files to arbitrary locations in the web root, leading to Remote Code Execution (RCE). Version 26.01.24 contains a fix for the issue.
References
Configurations
History
02 Mar 2026, 21:32
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/zhblue/hustoj/commit/902bd09e6d0011fe89cd84d4236899314b33101f - Patch | |
| References | () https://github.com/zhblue/hustoj/security/advisories/GHSA-xmgg-2rw4-7fxj - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CPE | cpe:2.3:a:hustoj:hustoj:*:*:*:*:*:*:*:* | |
| First Time |
Hustoj hustoj
Hustoj |
27 Jan 2026, 01:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-27 01:16
Updated : 2026-03-02 21:32
NVD link : CVE-2026-24479
Mitre link : CVE-2026-24479
CVE.ORG link : CVE-2026-24479
JSON object : View
Products Affected
hustoj
- hustoj
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
