CVE-2025-13262

7.3 HIGH

📋 TL;DR

A path traversal vulnerability in lsfusion platform allows remote attackers to manipulate file paths via the 'sid' parameter in UploadFileRequestHandler. This could enable unauthorized file access or upload outside intended directories. Affects lsfusion platform versions up to 6.1.

💻 Affected Systems

Products:
  • lsfusion platform
Versions: up to 6.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web-client component; requires file upload functionality to be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attackers could read sensitive system files, upload malicious files to arbitrary locations, or potentially achieve remote code execution.

🟠

Likely Case

Unauthorized file access leading to data leakage, configuration file exposure, or file system manipulation.

🟢

If Mitigated

Limited impact with proper input validation and file system permissions restricting traversal attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public disclosure indicates exploit details are available; path traversal vulnerabilities typically have low exploitation complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.1 or later

Vendor Advisory: https://github.com/lsfusion/platform/issues/1544

Restart Required: Yes

Instructions:

1. Upgrade to lsfusion platform version 6.1 or later. 2. Restart the application server. 3. Verify the fix by testing file upload functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to reject 'sid' parameters containing path traversal sequences like '../' or absolute paths.

Not applicable - requires code modification

File System Restrictions

linux

Configure application to run with minimal file system permissions and restrict upload directory to specific, isolated location.

chmod 750 /path/to/upload/directory
chown appuser:appgroup /path/to/upload/directory

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block path traversal patterns in requests.
  • Disable or restrict file upload functionality if not essential for business operations.

🔍 How to Verify

Check if Vulnerable:

Check lsfusion platform version; if version is 6.0 or earlier, system is vulnerable.

Check Version:

Check application configuration files or run: java -jar lsfusion.jar --version

Verify Fix Applied:

After patching, attempt to exploit using known path traversal payloads in 'sid' parameter during file upload; requests should be rejected.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with 'sid' parameter containing '../', '..\', or absolute paths
  • File access errors outside expected upload directory

Network Indicators:

  • HTTP POST requests to file upload endpoints with unusual parameter values

SIEM Query:

source="web_server" AND (uri_path="*upload*" AND (param="*../*" OR param="*..\\*"))

🔗 References

📤 Share & Export