CVE-2018-25178

7.5 HIGH

📋 TL;DR

Easyndexer 1.0 contains an unauthenticated arbitrary file download vulnerability that allows attackers to retrieve sensitive system files by manipulating the file parameter in POST requests to showtif.php. This affects all installations of Easyndexer 1.0, exposing configuration files, initialization files, and potentially other sensitive data.

💻 Affected Systems

Products:
  • Easyndexer
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of Easyndexer 1.0 are vulnerable by default. The showtif.php file is typically accessible without authentication.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers download critical system files like /etc/passwd, /etc/shadow, database credentials, or application configuration files, leading to complete system compromise, privilege escalation, or data exfiltration.

🟠

Likely Case

Attackers download web application configuration files containing database credentials, API keys, or other sensitive information, enabling further attacks against the application or related systems.

🟢

If Mitigated

If proper network segmentation and access controls are in place, attackers may only access non-critical files or be blocked from reaching the vulnerable endpoint.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on Exploit-DB and other sources. Attack requires only HTTP POST requests with manipulated file parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None

Vendor Advisory: None

Restart Required: No

Instructions:

No official patch exists. Remove or disable Easyndexer 1.0 entirely. Consider migrating to alternative software.

🔧 Temporary Workarounds

Delete showtif.php

linux

Remove the vulnerable file from the web server

rm /path/to/easyndexer/showtif.php

Restrict access to showtif.php

all

Use web server configuration to block access to the vulnerable endpoint

# Apache: <Location "/easyndexer/showtif.php">
#   Order deny,allow
#   Deny from all
# </Location>
# Nginx: location ~ /easyndexer/showtif\.php$ { deny all; }

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to the Easyndexer instance
  • Deploy a web application firewall (WAF) with rules to block requests containing path traversal patterns

🔍 How to Verify

Check if Vulnerable:

Send POST request to /easyndexer/showtif.php with file parameter containing path traversal (e.g., file=../../../etc/passwd). If response contains system file content, system is vulnerable.

Check Version:

Check Easyndexer version in application files or documentation. Typically found in README or configuration files.

Verify Fix Applied:

Attempt the same POST request after implementing workarounds. Should receive 403/404 error or no file content.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to showtif.php with file parameter containing path traversal patterns (../)
  • Unusual file access patterns from web server process

Network Indicators:

  • POST requests to showtif.php with file parameter exceeding normal length or containing suspicious characters

SIEM Query:

source="web_server_logs" AND uri="*showtif.php*" AND method="POST" AND (param="*../*" OR param="*..\\*" OR param="*etc/passwd*")

🔗 References

📤 Share & Export