CVE-2025-15360

4.7 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to upload arbitrary files to newbee-mall-plus 2.0.0 through the product information edit page. Attackers can exploit this to upload malicious files like web shells, potentially leading to server compromise. Any system running the vulnerable version with the upload functionality accessible is affected.

💻 Affected Systems

Products:
  • newbee-mall-plus
Versions: 2.0.0
Operating Systems: Any OS running Java applications
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the upload functionality in the product information edit page specifically

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover via web shell upload leading to data theft, ransomware deployment, or use as attack platform

🟠

Likely Case

Web shell upload enabling persistent backdoor access, data exfiltration, or lateral movement

🟢

If Mitigated

File uploads restricted to authorized users only with proper validation, limiting impact

🌐 Internet-Facing: HIGH - Remote exploitation possible without authentication
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or compromised accounts

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details publicly disclosed on GitHub; vendor unresponsive to disclosure

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider implementing input validation and file type restrictions in UploadController.java

🔧 Temporary Workarounds

Implement file upload validation

all

Add server-side validation to restrict file types, extensions, and content

Modify src/main/java/ltd/newbee/mall/controller/common/UploadController.java to validate file types, extensions, and MIME types

Disable upload functionality

all

Temporarily disable the vulnerable upload endpoint

Comment out or remove upload mapping in UploadController.java
Add @RequestMapping restriction to limit access

🧯 If You Can't Patch

  • Implement WAF rules to block suspicious file uploads and known exploit patterns
  • Restrict network access to the upload endpoint using firewall rules or network segmentation

🔍 How to Verify

Check if Vulnerable:

Check if running newbee-mall-plus 2.0.0 and test file upload with restricted extensions like .jsp, .php, .exe

Check Version:

Check pom.xml or application properties for version information

Verify Fix Applied:

Test upload functionality with malicious file types to ensure they are rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with suspicious extensions
  • Multiple failed upload attempts
  • Uploads from unexpected IP addresses

Network Indicators:

  • HTTP POST requests to upload endpoints with unusual file types
  • Traffic patterns indicating file upload exploitation

SIEM Query:

source="web_server" AND (uri="/upload" OR uri CONTAINS "upload") AND (file_extension IN ("jsp", "php", "exe", "war"))

🔗 References

📤 Share & Export