CVE-2025-0225

4.3 MEDIUM

📋 TL;DR

This path traversal vulnerability in Tsinghua Unigroup Electronic Archives System allows attackers to read arbitrary files by manipulating the 'name' parameter in the /setting/ClassFy/exampleDownload.html endpoint. Organizations using version 3.2.210802(62532) of this electronic archives system are affected. The vulnerability can be exploited remotely without authentication.

💻 Affected Systems

Products:
  • Tsinghua Unigroup Electronic Archives System
Versions: 3.2.210802(62532)
Operating Systems: Any OS running the vulnerable software
Default Config Vulnerable: ⚠️ Yes
Notes: Only this specific version/build is confirmed vulnerable. Other versions may also be affected but not confirmed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, or user data, potentially leading to credential theft, system compromise, or data exfiltration.

🟠

Likely Case

Attackers will read accessible files within the web server's context, potentially exposing configuration files, logs, or other sensitive information stored in predictable locations.

🟢

If Mitigated

With proper file permissions and web server restrictions, impact is limited to reading only files the web server process can access, reducing exposure of critical system files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exploit code is available on GitHub, making exploitation trivial for attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Check vendor website for updates or apply workarounds.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement input validation to reject path traversal sequences like '../' in the name parameter

Modify application code to sanitize the 'name' parameter before processing

Web Server Restriction

all

Configure web server to block access to the vulnerable endpoint or restrict file access

Add location block in nginx: location ~* /setting/ClassFy/exampleDownload.html { deny all; }
Add in Apache: <Location "/setting/ClassFy/exampleDownload.html"> Require all denied </Location>

🧯 If You Can't Patch

  • Implement WAF rules to block requests containing path traversal sequences to the vulnerable endpoint
  • Restrict network access to the system using firewall rules, allowing only trusted IP addresses

🔍 How to Verify

Check if Vulnerable:

Test by sending a request to /setting/ClassFy/exampleDownload.html?name=../../../etc/passwd and checking if file contents are returned

Check Version:

Check system documentation or web interface for version information

Verify Fix Applied:

After applying workarounds, test the same request and verify it's blocked or returns an error

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /setting/ClassFy/exampleDownload.html with '../' sequences in parameters
  • Unusual file access patterns from web server process

Network Indicators:

  • HTTP GET requests with path traversal sequences in query parameters
  • Traffic to the vulnerable endpoint from unexpected sources

SIEM Query:

source="web_logs" AND uri="/setting/ClassFy/exampleDownload.html" AND (query="*../*" OR query="*..\\*" OR query="*%2e%2e%2f*")

🔗 References

📤 Share & Export