CVE-2025-12223
📋 TL;DR
This vulnerability in Bdtask Flight Booking Software allows attackers to upload arbitrary files without restrictions via the Package Information Module. This affects all systems running vulnerable versions of the software. Remote attackers can exploit this to potentially execute malicious code on affected servers.
💻 Affected Systems
- Bdtask Flight Booking Software
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, and lateral movement within the network.
Likely Case
Webshell deployment allowing persistent access, data exfiltration, and further exploitation of the server.
If Mitigated
Limited impact with proper file upload validation, web application firewalls, and restricted server permissions.
🎯 Exploit Status
Exploit details are publicly available in GitHub repositories; manipulation leads to unrestricted file upload.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available - vendor did not respond to disclosure
Restart Required: No
Instructions:
No official patch available. Consider upgrading to version 3.2 or later if released, or apply workarounds.
🔧 Temporary Workarounds
Implement File Upload Restrictions
allConfigure web server or application to restrict file uploads to specific extensions and validate file content.
Disable Package Information Module
allTemporarily disable or restrict access to the /b2c/package-information endpoint if not required.
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block malicious file upload attempts
- Restrict server permissions to prevent execution of uploaded files in web directories
🔍 How to Verify
Check if Vulnerable:
Check if running Bdtask Flight Booking Software version 3.1 or earlier and test file upload functionality at /b2c/package-information.
Check Version:
Check software version in admin panel or configuration files.
Verify Fix Applied:
Test if file upload restrictions are properly enforced and malicious uploads are blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual file upload activity to /b2c/package-information
- Uploads of executable files (e.g., .php, .jsp, .asp)
Network Indicators:
- HTTP POST requests to /b2c/package-information with file uploads
- Unusual outbound connections from web server
SIEM Query:
source="web_server" AND (uri="/b2c/package-information" AND method="POST") AND (file_extension="php" OR file_extension="jsp" OR file_extension="asp")