CVE-2025-11016

4.3 MEDIUM

📋 TL;DR

A path traversal vulnerability in kodbox up to version 1.61.09 allows attackers to access files outside the intended directory by manipulating the 'path' parameter in the fileOut function. This affects all users running vulnerable versions of kodbox, potentially exposing sensitive system files. The vulnerability can be exploited remotely without authentication.

💻 Affected Systems

Products:
  • kalcaddle kodbox
Versions: Up to and including 1.61.09
Operating Systems: All platforms running kodbox
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the fileOut function of app/controller/explorer/index.class.php.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files like /etc/passwd, configuration files, or source code, potentially leading to credential theft, privilege escalation, or further system compromise.

🟠

Likely Case

Unauthorized access to application files, configuration data, or user-uploaded content stored in directories accessible to the web server.

🟢

If Mitigated

Limited impact if proper file permissions restrict web server access to sensitive directories and files are properly validated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available in GitHub issues. The vulnerability requires minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

Upgrade to a version above 1.61.09 if available. Since vendor has not responded, monitor official channels for patches or consider alternative software.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to block path traversal sequences like '../' in the path parameter

Web Application Firewall Rule

all

Configure WAF to block requests containing path traversal patterns

🧯 If You Can't Patch

  • Restrict web server permissions to limit access to sensitive directories
  • Implement network segmentation to isolate kodbox instances from critical systems

🔍 How to Verify

Check if Vulnerable:

Check kodbox version in admin panel or by examining source files. Versions ≤1.61.09 are vulnerable.

Check Version:

Check admin panel or examine kodbox configuration files for version information

Verify Fix Applied:

Test path traversal attempts with sequences like '../../etc/passwd' in path parameter to verify they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with '../' sequences in URL parameters
  • Access to unexpected file paths in web server logs
  • Failed file access attempts outside web root

Network Indicators:

  • HTTP requests containing path traversal patterns in query strings or POST data

SIEM Query:

web.url:*../* OR web.uri:*../* OR http.request.uri.query:*../*

🔗 References

📤 Share & Export