CVE-2025-10245

4.3 MEDIUM

📋 TL;DR

A path traversal vulnerability in Display Painéis TGA allows attackers to access files outside the intended directory by manipulating the 'current_folder' parameter in the gallery rename functionality. This affects all systems running Display Painéis TGA up to version 7.1.41. The vulnerability has been publicly disclosed and may be actively exploited.

💻 Affected Systems

Products:
  • Display Painéis TGA
Versions: Up to and including 7.1.41
Operating Systems: All platforms running the software
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the gallery rename functionality at /gallery/rename endpoint. All installations with this component enabled are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, or source code, potentially leading to credential theft, system compromise, or further exploitation.

🟠

Likely Case

Unauthorized file access leading to information disclosure of application files, configuration data, or user-uploaded content.

🟢

If Mitigated

Limited impact with proper file system permissions and web server restrictions in place.

🌐 Internet-Facing: HIGH - Public exploit available and vulnerability affects web-accessible functionality.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this to escalate privileges or access sensitive data.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code is publicly available on GitHub. The vulnerability requires access to the gallery rename functionality, which may require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor has not responded to disclosure. Consider workarounds or alternative software.

🔧 Temporary Workarounds

Disable Gallery Rename Functionality

all

Remove or restrict access to the vulnerable /gallery/rename endpoint

# Example for Apache: RewriteRule ^/gallery/rename - [F]
# Example for Nginx: location ~ ^/gallery/rename { deny all; }

Implement Input Validation

all

Add server-side validation to sanitize the current_folder parameter

# Implement proper path validation in application code
# Example: if (!isValidPath(current_folder)) { return error; }

🧯 If You Can't Patch

  • Implement strict file system permissions to limit what the web application can access
  • Deploy a web application firewall (WAF) with path traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Check if your Display Painéis TGA version is 7.1.41 or earlier and if the /gallery/rename endpoint is accessible.

Check Version:

# Check version in application interface or configuration files

Verify Fix Applied:

Test if path traversal attempts through the current_folder parameter are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /gallery/rename
  • Requests with directory traversal sequences (../, ..\) in parameters

Network Indicators:

  • HTTP requests to /gallery/rename with path traversal payloads

SIEM Query:

web.url:*gallery/rename* AND (web.param:*../* OR web.param:*..\*)

🔗 References

📤 Share & Export