CVE-2025-10468

7.5 HIGH

📋 TL;DR

This path traversal vulnerability in Beyaz Computer CityPlus allows attackers to access files outside the intended directory by manipulating file paths. It affects all CityPlus installations before version 24.29375, potentially exposing sensitive system files.

💻 Affected Systems

Products:
  • Beyaz Computer CityPlus
Versions: All versions before 24.29375
Operating Systems: All supported OS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable; no special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading sensitive files like /etc/passwd, /etc/shadow, or configuration files containing credentials, potentially leading to privilege escalation or data exfiltration.

🟠

Likely Case

Unauthorized access to application configuration files, source code, or user data stored in adjacent directories, enabling further attacks or information disclosure.

🟢

If Mitigated

Limited impact if proper input validation and directory restrictions are enforced, potentially only allowing access to non-sensitive files within the application's scope.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal typically requires minimal technical skill; exploitation depends on specific endpoint implementation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.29375 or later

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-25-0279

Restart Required: Yes

Instructions:

1. Download CityPlus version 24.29375 or later from official vendor sources. 2. Backup current installation and data. 3. Install the updated version following vendor documentation. 4. Restart the CityPlus service or server.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to reject path traversal sequences like ../, ..\, or absolute paths

# Example for web server config (adjust for your environment)
# In application code: validate user input against whitelist of allowed characters

Web Application Firewall Rules

all

Configure WAF to block requests containing path traversal patterns

# Example ModSecurity rule: SecRule ARGS "\.\./" "id:1001,phase:2,deny"

🧯 If You Can't Patch

  • Implement strict input validation on all file access endpoints to filter out ../, ..\, and similar sequences
  • Configure application to run with minimal privileges and restrict filesystem access using chroot, containers, or proper permissions

🔍 How to Verify

Check if Vulnerable:

Test by attempting to access files outside web root using ../ sequences in file parameters (e.g., ?file=../../../etc/passwd). Only perform on authorized systems.

Check Version:

Check CityPlus version in administration interface or configuration files; consult vendor documentation for exact location.

Verify Fix Applied:

After patching, repeat the vulnerability test; attempts should be blocked or return error messages instead of file contents.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing ../ or ..\ sequences in parameters
  • Unusual file access patterns outside normal application directories
  • Failed file access attempts with traversal patterns

Network Indicators:

  • HTTP requests with encoded traversal sequences (%2e%2e%2f)
  • Multiple failed attempts to access sensitive system paths

SIEM Query:

source="web_logs" AND (uri="*../*" OR params="*../*" OR params="*..\\*")

🔗 References

📤 Share & Export