CVE-2025-13200
📋 TL;DR
This vulnerability in SourceCodester Farm Management System 1.0 allows attackers to remotely view directory listings, potentially exposing sensitive files and system information. Any organization using this specific version of the software is affected. The vulnerability enables information disclosure without requiring authentication.
💻 Affected Systems
- SourceCodester Farm Management System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers discover and download sensitive configuration files, database backups, or credentials, leading to full system compromise or data breach.
Likely Case
Attackers enumerate directory structures to find vulnerable files, configuration details, or backup files that could facilitate further attacks.
If Mitigated
Directory listing is disabled, preventing information disclosure while the underlying vulnerability remains unpatched.
🎯 Exploit Status
The exploit requires only web browser access or simple HTTP requests to vulnerable directories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.sourcecodester.com/
Restart Required: No
Instructions:
No official patch available. Check vendor website for updates or consider alternative software.
🔧 Temporary Workarounds
Disable Directory Listing
allConfigure web server to prevent directory listing in vulnerable directories
For Apache: Add 'Options -Indexes' to .htaccess or httpd.conf
For Nginx: Add 'autoindex off;' to server block configuration
Restrict Access with Authentication
allImplement authentication for accessing sensitive directories
For Apache: Use .htaccess with AuthType Basic
For Nginx: Use auth_basic directives
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block directory listing requests
- Isolate the vulnerable system behind a reverse proxy that filters directory requests
🔍 How to Verify
Check if Vulnerable:
Access application directories via browser or curl and check if directory contents are displayed without index files
Check Version:
Check application version in admin panel or configuration files
Verify Fix Applied:
Attempt to access directories and verify that directory listings are no longer displayed
📡 Detection & Monitoring
Log Indicators:
- Multiple 200 OK responses to directory paths without specific file requests
- Unusual access patterns to non-standard directories
Network Indicators:
- HTTP requests ending with '/' or without file extensions returning directory listings
SIEM Query:
web.status_code=200 AND (url.path="/" OR url.path LIKE "%/") AND NOT (url.path LIKE "%.%" OR url.path LIKE "%/index.%")