Description
HUSTOF is an open source online judge based on PHP/C++/MySQL/Linux for ACM/ICPC and NOIP training. Prior to version 26.01.24, the problem_import_qduoj.php and problem_import_hoj.php modules fail to properly sanitize filenames within uploaded ZIP archives. Attackers can craft a malicious ZIP file containing files with path traversal sequences (e.g., ../../shell.php). When extracted by the server, this allows writing files to arbitrary locations in the web root, leading to Remote Code Execution (RCE). Version 26.01.24 contains a fix for the issue.
Exploits (1)
exploitdb
WORKING POC
by Marshall Whittaker · rubywebappsmultiple
https://www.exploit-db.com/exploits/52539
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/zhblue/hustoj/security/advisories/GHSA-xmgg-2rw4-7fxj
Patch x_refsource_misc
https://github.com/zhblue/hustoj/commit/902bd09e6d0011fe89cd84d4236899314b33101f
Scores
CVSS v3
9.8
EPSS
0.0276
EPSS Percentile
86.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-22
Status
published
Products (1)
hustoj/hustoj
< 26.01.24
Published
Jan 27, 2026
Tracked Since
Feb 18, 2026