CVE-2025-0328

7.3 HIGH

📋 TL;DR

This critical vulnerability allows remote attackers to execute arbitrary commands on KaiYuanTong ECT Platform servers through command injection in the /public/server/runCode.php endpoint. Attackers can exploit this by sending specially crafted HTTP POST requests containing malicious code in the 'code' parameter. All users running affected versions of KaiYuanTong ECT Platform are vulnerable.

💻 Affected Systems

Products:
  • KaiYuanTong ECT Platform
Versions: Up to and including version 2.0.0
Operating Systems: All operating systems running the affected software
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation and requires no special configuration to be exploitable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands with web server privileges, potentially leading to data theft, ransomware deployment, or complete server takeover.

🟠

Likely Case

Remote code execution leading to web shell installation, data exfiltration, or lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF rules, and input validation are in place to block malicious requests.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is accessible via HTTP POST requests and can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - While still vulnerable, internal-only deployments have reduced attack surface compared to internet-facing instances.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed and the vulnerability is relatively easy to exploit with basic HTTP request crafting skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - vendor did not respond to disclosure

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement workarounds and mitigations.

🔧 Temporary Workarounds

Block vulnerable endpoint

all

Use web server configuration or WAF to block access to /public/server/runCode.php

# Apache: RewriteRule ^/public/server/runCode\.php$ - [F,L]
# Nginx: location ~ /public/server/runCode\.php$ { deny all; }

Input validation and sanitization

all

Implement strict input validation for the 'code' parameter to reject any shell metacharacters

🧯 If You Can't Patch

  • Implement network segmentation to isolate affected systems from critical assets
  • Deploy web application firewall (WAF) with rules to detect and block command injection attempts

🔍 How to Verify

Check if Vulnerable:

Check if /public/server/runCode.php exists and accepts POST requests with 'code' parameter. Test with safe payload like 'echo test' to confirm command execution.

Check Version:

Check application version in admin panel or configuration files. For web interface: typically accessible at /admin or similar paths.

Verify Fix Applied:

Verify that /public/server/runCode.php is no longer accessible or properly sanitizes input. Test with same safe payload to ensure no command execution occurs.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /public/server/runCode.php containing shell metacharacters (;, |, &, $, etc.)
  • Unusual command execution patterns in system logs following web requests

Network Indicators:

  • HTTP POST requests to /public/server/runCode.php with suspicious 'code' parameter values
  • Outbound connections from web server to unexpected destinations

SIEM Query:

source="web_logs" AND uri_path="/public/server/runCode.php" AND (request_method="POST" AND request_body CONTAINS "code=") AND (request_body CONTAINS ";" OR request_body CONTAINS "|" OR request_body CONTAINS "&")

🔗 References

📤 Share & Export