CVE-2025-11020

8.8 HIGH

📋 TL;DR

A path traversal vulnerability in MarkAny SafePC Enterprise allows attackers to access server information, potentially enabling SQL injection and unrestricted file upload exploits. This affects SafePC Enterprise versions V7.0.* before V7.0.1 and all V5.*.* versions on Windows and Linux systems.

💻 Affected Systems

Products:
  • MarkAny SafePC Enterprise
Versions: V7.0.* (before V7.0.1) and V5.*.*
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability chain involves path traversal leading to potential SQL injection and file upload exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through SQL injection leading to data exfiltration, privilege escalation, and remote code execution via malicious file uploads.

🟠

Likely Case

Unauthorized access to sensitive server information, potential data leakage, and limited file system access through path traversal.

🟢

If Mitigated

Limited information disclosure with no critical system access if proper input validation and file upload restrictions are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

The vulnerability chain requires multiple exploitation steps but appears to be unauthenticated based on the description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V7.0.1

Vendor Advisory: https://www.markany.com/enterprisesecurity

Restart Required: Yes

Instructions:

1. Download V7.0.1 patch from MarkAny vendor portal. 2. Backup current configuration. 3. Apply patch following vendor instructions. 4. Restart SafePC Enterprise services. 5. Verify patch installation.

🔧 Temporary Workarounds

Restrict File Upload Types

all

Configure SafePC to only allow specific safe file types for upload

Configure via SafePC admin interface: Settings > File Upload > Allowed Types = .txt,.pdf,.docx

Implement Web Application Firewall

all

Deploy WAF with path traversal and SQL injection protection rules

Configure WAF rules to block ../ patterns and SQL keywords in URLs

🧯 If You Can't Patch

  • Isolate vulnerable systems from internet access and restrict to internal network only
  • Implement strict network segmentation and monitor for unusual file upload or database access patterns

🔍 How to Verify

Check if Vulnerable:

Check SafePC version in admin interface or via command: safepc --version

Check Version:

safepc --version

Verify Fix Applied:

Verify version shows V7.0.1 or later, and test path traversal attempts return proper error messages

📡 Detection & Monitoring

Log Indicators:

  • Multiple ../ sequences in URL requests
  • Unusual file upload attempts with executable extensions
  • SQL error messages in application logs

Network Indicators:

  • HTTP requests with path traversal patterns
  • Unexpected database connection attempts from application server

SIEM Query:

source="safepc.log" AND ("../" OR "..\\" OR "SELECT" OR "UNION")

🔗 References

📤 Share & Export