CVE-2025-13875

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to perform path traversal attacks in Yohann0617 oci-helper versions up to 3.2.4. By manipulating file arguments in the OCI Configuration Upload component, attackers can write files to arbitrary locations on the server. Organizations using vulnerable versions of this software are affected.

💻 Affected Systems

Products:
  • Yohann0617 oci-helper
Versions: Up to and including 3.2.4
Operating Systems: Any OS running Java
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the OCI Configuration Upload component specifically; requires the vulnerable endpoint to be accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary file overwrite leading to remote code execution, data destruction, or privilege escalation.

🟠

Likely Case

Unauthorized file writes to sensitive locations, potentially enabling further exploitation or data manipulation.

🟢

If Mitigated

Limited impact if proper file system permissions restrict write access to critical directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept exploit is publicly available; remote exploitation is possible without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available; vendor did not respond to disclosure. Consider workarounds or discontinuing use.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation to reject file paths containing directory traversal sequences (../, ..\)

File Path Restriction

all

Restrict file uploads to specific safe directories using absolute path validation

🧯 If You Can't Patch

  • Disable or restrict access to the OCI Configuration Upload functionality
  • Implement network segmentation and firewall rules to limit access to affected systems

🔍 How to Verify

Check if Vulnerable:

Check if using oci-helper version 3.2.4 or earlier and if the OCI Configuration Upload endpoint is accessible

Check Version:

Check application version in pom.xml or build configuration files

Verify Fix Applied:

Test with path traversal payloads (e.g., '../../etc/passwd') to confirm file writes are restricted

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write attempts to system directories
  • Requests containing '../' patterns to upload endpoints

Network Indicators:

  • HTTP requests with path traversal sequences in file parameters

SIEM Query:

http.url:*../* AND http.method:POST AND http.path:*upload*

🔗 References

📤 Share & Export