CVE-2020-13894

7.5 HIGH

📋 TL;DR

CVE-2020-13894 is an arbitrary file download vulnerability in DEXT5 Editor's upload_handler.jsp component. Attackers can exploit the savefilepath parameter to download any file from the server, potentially exposing sensitive data. This affects all systems running DEXT5 Editor version 3.5.1402961 and earlier.

💻 Affected Systems

Products:
  • DEXT5 Editor
Versions: Through 3.5.1402961
Operating Systems: All platforms running DEXT5 Editor
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web-based editor component when deployed with default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through downloading configuration files containing credentials, followed by lateral movement and data exfiltration.

🟠

Likely Case

Sensitive file disclosure including configuration files, source code, or user data stored on the server.

🟢

If Mitigated

Limited impact if proper file permissions restrict access to sensitive directories and files.

🌐 Internet-Facing: HIGH - Directly exploitable via HTTP requests without authentication in default configurations.
🏢 Internal Only: MEDIUM - Still exploitable by authenticated users or attackers who gain initial access to the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request manipulation required. Public proof-of-concept demonstrates exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 3.5.1402961

Vendor Advisory: Not publicly documented by vendor

Restart Required: Yes

Instructions:

1. Upgrade DEXT5 Editor to version newer than 3.5.1402961. 2. Restart the application server. 3. Verify the upload_handler.jsp component has been updated.

🔧 Temporary Workarounds

Restrict upload_handler.jsp access

all

Block or restrict access to the vulnerable JSP file using web server configuration or firewall rules.

# Apache: <Location "/dext5/upload_handler.jsp"> Require all denied </Location>
# Nginx: location ~ /dext5/upload_handler\.jsp { deny all; }

Input validation filter

all

Implement input validation to restrict savefilepath parameter to allowed directories only.

# Web application filter to validate savefilepath parameter against whitelist

🧯 If You Can't Patch

  • Implement strict file system permissions to limit accessible directories
  • Deploy web application firewall (WAF) with rules blocking directory traversal patterns

🔍 How to Verify

Check if Vulnerable:

Test by sending HTTP request to /dext5/upload_handler.jsp with savefilepath parameter pointing to known system files like /etc/passwd (Linux) or C:\Windows\win.ini (Windows).

Check Version:

Check DEXT5 Editor version in web interface or configuration files. Look for version number in deployed JSP/WAR files.

Verify Fix Applied:

Attempt the same exploitation test after patching - should return error or empty response instead of file contents.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to upload_handler.jsp with savefilepath parameter containing directory traversal sequences (../, ..\)
  • Unusual file access patterns from web server process

Network Indicators:

  • HTTP GET/POST requests to upload_handler.jsp with long or suspicious savefilepath parameters

SIEM Query:

web.url="*upload_handler.jsp*" AND (web.param="*../*" OR web.param="*..\\*")

🔗 References

📤 Share & Export