CVE-2025-2651
📋 TL;DR
This vulnerability in SourceCodester Online Eyewear Shop 1.0 allows attackers to view directory listings in the /oews/admin/ path and subdirectories remotely. This exposes sensitive file and directory information that should not be publicly accessible. Anyone running this specific e-commerce software version is affected.
💻 Affected Systems
- SourceCodester Online Eyewear Shop
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers discover sensitive configuration files, backup files, or credentials stored in accessible directories, leading to full system compromise.
Likely Case
Attackers map the application structure, identify other vulnerabilities, and access sensitive information like configuration details or backup files.
If Mitigated
Directory listing is disabled, limiting information exposure to only explicitly accessible files.
🎯 Exploit Status
Exploit details are publicly available on GitHub. Attack requires only web browser or curl requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.sourcecodester.com/
Restart Required: No
Instructions:
No official patch available. Configure web server to disable directory listing.
🔧 Temporary Workarounds
Disable Directory Listing in Apache
linuxAdd Options -Indexes directive to Apache configuration to prevent directory listing
Add 'Options -Indexes' to .htaccess file in /oews/admin/ directory or Apache config
Disable Directory Listing in Nginx
linuxConfigure Nginx to not show directory contents when no index file is present
Add 'autoindex off;' to Nginx server block configuration
Disable Directory Listing in IIS
windowsDisable directory browsing in IIS Manager
In IIS Manager: Select site → Directory Browsing → Disable
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block requests to directory listings
- Restrict access to /oews/admin/ path using IP whitelisting or authentication
🔍 How to Verify
Check if Vulnerable:
Navigate to http://[target]/oews/admin/ in browser. If directory listing shows files instead of 403 error, system is vulnerable.
Check Version:
Check application files or database for version information. No standard command available.
Verify Fix Applied:
Attempt to access http://[target]/oews/admin/. Should return 403 Forbidden or redirect to login instead of showing directory contents.
📡 Detection & Monitoring
Log Indicators:
- Multiple 200 OK responses to /oews/admin/ paths without specific file requests
- Unusual access patterns to admin directories
Network Indicators:
- HTTP requests to /oews/admin/ without file extensions
- Directory traversal patterns in URLs
SIEM Query:
source=web_logs (url="/oews/admin/" OR url="/oews/admin/*") status=200 user_agent!="*bot*"