CVE-2025-15432

5.3 MEDIUM

📋 TL;DR

This is a path traversal vulnerability in yeqifu carRental software that allows attackers to access arbitrary files on the server by manipulating the 'path' parameter in the downloadShowFile function. The vulnerability affects all versions up to commit 3fabb7eae93d209426638863980301d6f99866b3. Attackers can exploit this remotely without authentication.

💻 Affected Systems

Products:
  • yeqifu carRental
Versions: All versions up to commit 3fabb7eae93d209426638863980301d6f99866b3
Operating Systems: Any OS running the vulnerable software
Default Config Vulnerable: ⚠️ Yes
Notes: The project uses a rolling release model, so specific version numbers are not available. All deployments using the vulnerable commit or earlier are affected.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, or source code, potentially leading to complete system compromise if credentials or secrets are exposed.

🟠

Likely Case

Unauthorized access to application files, configuration data, or other sensitive information stored on the server.

🟢

If Mitigated

Limited impact if proper file permissions and input validation are implemented, restricting access to only intended files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed in GitHub issue #46. The vulnerability is simple to exploit with basic HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch is available. The vendor has been notified but has not responded. Consider implementing workarounds or migrating to alternative software.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to reject path traversal sequences like '../' in the path parameter

Implement input sanitization in the downloadShowFile function to validate path parameters

Web Application Firewall Rule

all

Block requests containing path traversal patterns in URL parameters

Add WAF rule to block requests with '../' or similar patterns in query parameters

🧯 If You Can't Patch

  • Restrict file system permissions to limit what files the application can access
  • Implement network segmentation to isolate the vulnerable system from sensitive data

🔍 How to Verify

Check if Vulnerable:

Test by sending a request to /file/downloadShowFile.action with a path parameter containing '../' sequences and observe if it returns files outside the intended directory

Check Version:

Check the Git commit hash of the deployed carRental instance

Verify Fix Applied:

Test the same path traversal attempts and verify they are rejected or return error messages

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /file/downloadShowFile.action with '../' in parameters
  • Unusual file access patterns from the application

Network Indicators:

  • HTTP requests with path traversal sequences in URL parameters

SIEM Query:

url:*/file/downloadShowFile.action* AND (path:*../* OR param:*../*)

🔗 References

📤 Share & Export