CVE-2025-0202

5.5 MEDIUM

📋 TL;DR

A potential file inclusion vulnerability exists in TCS BaNCS 10 through the /REPORTS/REPORTS_SHOW_FILE.jsp endpoint. Attackers could manipulate the FilePath parameter to access unauthorized files on the server. Organizations using TCS BaNCS 10 are affected, though the vulnerability's existence is currently unconfirmed.

💻 Affected Systems

Products:
  • TCS BaNCS 10
Versions: Specific version range unknown - all versions of BaNCS 10 may be affected
Operating Systems: Unknown - likely multiple platforms supported by TCS BaNCS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects the /REPORTS/REPORTS_SHOW_FILE.jsp endpoint. The existence of this vulnerability is currently doubted according to sources.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through arbitrary file read leading to credential theft, configuration exposure, and potential privilege escalation.

🟠

Likely Case

Unauthorized access to sensitive files containing configuration data, logs, or user information.

🟢

If Mitigated

Limited impact due to proper input validation, file system permissions, and network segmentation.

🌐 Internet-Facing: MEDIUM - If the vulnerable endpoint is exposed to the internet, attackers could attempt exploitation without network access.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this to access sensitive files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of the application's file structure and parameter manipulation. No confirmed exploits exist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

1. Contact TCS support for official guidance. 2. Monitor TCS security advisories. 3. Apply any patches when available.

🔧 Temporary Workarounds

Input Validation

all

Implement strict input validation on the FilePath parameter to restrict file access to authorized directories only.

Access Control

all

Restrict access to the /REPORTS/REPORTS_SHOW_FILE.jsp endpoint to authorized users only.

🧯 If You Can't Patch

  • Implement web application firewall rules to block suspicious file path patterns
  • Restrict network access to the BaNCS application to trusted sources only

🔍 How to Verify

Check if Vulnerable:

Test the /REPORTS/REPORTS_SHOW_FILE.jsp endpoint with various FilePath parameter values to check for file inclusion.

Check Version:

Check BaNCS version through application interface or configuration files

Verify Fix Applied:

Verify that file inclusion attempts are properly blocked and return appropriate error messages.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file path patterns in access logs
  • Multiple failed attempts to access /REPORTS/REPORTS_SHOW_FILE.jsp
  • Access to sensitive system files from web requests

Network Indicators:

  • Unusual traffic patterns to the reports endpoint
  • Requests with suspicious file path parameters

SIEM Query:

source="web_logs" AND uri="/REPORTS/REPORTS_SHOW_FILE.jsp" AND (parameter="FilePath" AND value CONTAINS "../" OR value CONTAINS "/etc/" OR value CONTAINS "/proc/")

🔗 References

📤 Share & Export