CVE-2025-13791

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to perform path traversal attacks via the project import function in Scada-LTS. By exploiting improper path validation in ZIP file extraction, attackers can write arbitrary files outside the intended directory. This affects all Scada-LTS installations up to version 2.7.8.1.

💻 Affected Systems

Products:
  • Scada-LTS
Versions: Up to and including 2.7.8.1
Operating Systems: All platforms running Scada-LTS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using the project import feature are vulnerable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, or disruption of industrial control operations

🟠

Likely Case

Arbitrary file write allowing file system manipulation, potential privilege escalation, or denial of service

🟢

If Mitigated

Limited impact if proper file system permissions restrict write access to critical directories

🌐 Internet-Facing: HIGH - Attack can be launched remotely without authentication
🏢 Internal Only: HIGH - Even internal attackers can exploit this vulnerability

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept exploit is publicly available in GitHub repository

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor did not respond to disclosure. Consider upgrading to any future version that addresses this issue.

🔧 Temporary Workarounds

Disable Project Import Feature

all

Remove or disable the project import functionality to prevent exploitation

# Remove or rename the ZIPProjectManager.java file
# Disable web access to project import endpoints

Implement Input Validation

all

Add path traversal validation to the Common.getHomeDir function

# Modify br/org/scadabr/vo/exporter/ZIPProjectManager.java
# Add path normalization and validation before file operations

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Scada-LTS from untrusted networks
  • Deploy web application firewall with path traversal detection rules

🔍 How to Verify

Check if Vulnerable:

Check if Scada-LTS version is 2.7.8.1 or earlier and if project import feature is enabled

Check Version:

# Check Scada-LTS version in web interface or configuration files

Verify Fix Applied:

Verify that path traversal attempts are properly blocked during project import operations

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed project import attempts
  • Unusual file write operations outside expected directories
  • Path traversal patterns in request logs

Network Indicators:

  • Unusual ZIP file uploads to project import endpoints
  • Requests containing '../' patterns

SIEM Query:

source="scada-lts" AND (event="project_import" OR url="*import*") AND (message="*../*" OR message="*..\\*")

🔗 References

📤 Share & Export