CVE-2025-13265

6.3 MEDIUM

📋 TL;DR

This CVE describes a path traversal vulnerability in the lsfusion platform's unpackFile function that allows remote attackers to write files outside intended directories. It affects lsfusion platform installations up to version 6.1. Attackers can exploit this to potentially overwrite critical system files or deploy malicious payloads.

💻 Affected Systems

Products:
  • lsfusion platform
Versions: Up to and including version 6.1
Operating Systems: All platforms running Java
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the file server component when processing ZIP files via the unpackFile function.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, or ransomware deployment.

🟠

Likely Case

File system manipulation allowing attackers to overwrite configuration files, deploy web shells, or disrupt application functionality.

🟢

If Mitigated

Limited impact with proper file system permissions and input validation controls in place.

🌐 Internet-Facing: HIGH - Attack can be initiated remotely without authentication.
🏢 Internal Only: MEDIUM - Still exploitable from internal networks but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities are typically straightforward to exploit once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 6.2 or later

Vendor Advisory: https://github.com/lsfusion/platform/issues/1545

Restart Required: Yes

Instructions:

1. Upgrade lsfusion platform to version 6.2 or later. 2. Restart the application server. 3. Verify the fix by testing ZIP file upload functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to reject ZIP files containing path traversal sequences

File System Sandboxing

linux

Run lsfusion with restricted file system permissions and in a chroot/jail environment

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to lsfusion servers
  • Deploy web application firewall (WAF) rules to detect and block path traversal attempts

🔍 How to Verify

Check if Vulnerable:

Check lsfusion version - if version is 6.1 or earlier, system is vulnerable.

Check Version:

Check application logs or configuration files for version information

Verify Fix Applied:

After upgrading to 6.2+, test ZIP file upload with path traversal payloads to confirm they are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Failed file extraction attempts
  • ZIP processing errors
  • Unusual file write operations outside expected directories

Network Indicators:

  • HTTP POST requests with ZIP files containing '../' sequences in filenames

SIEM Query:

source="lsfusion" AND ("unpackFile" OR "ZipUtils") AND ("error" OR "exception")

🔗 References

📤 Share & Export