CVE-2025-27224

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload malicious files to arbitrary locations on TRUfusion Enterprise servers via path traversal in the /trufusionPortal/fileupload endpoint. This can lead to remote code execution by writing executable files to sensitive directories. All systems running TRUfusion Enterprise through version 7.10.4.0 are affected.

💻 Affected Systems

Products:
  • Rocket TRUfusion Enterprise
Versions: through 7.10.4.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable endpoint is accessible without authentication, making all default installations vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through remote code execution, allowing attackers to install malware, steal data, pivot to other systems, or deploy ransomware.

🟠

Likely Case

Attackers upload web shells or malicious scripts to gain persistent access, exfiltrate sensitive data, or disrupt operations.

🟢

If Mitigated

If proper network segmentation and file integrity monitoring are in place, impact may be limited to the application server with detection of unauthorized file writes.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is pre-authentication and requires only HTTP requests with path traversal sequences. Public exploit details are available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.rocketsoftware.com/products/rocket-b2b-supply-chain-integration/rocket-trufusion-enterprise

Restart Required: No

Instructions:

1. Contact Rocket Software for patch availability. 2. Apply the patch when available. 3. Test in non-production environment first. 4. Deploy to production systems.

🔧 Temporary Workarounds

Block Vulnerable Endpoint

all

Use web application firewall or reverse proxy to block access to /trufusionPortal/fileupload endpoint

# Example for Apache mod_rewrite
RewriteRule ^/trufusionPortal/fileupload - [F,L]
# Example for Nginx
location /trufusionPortal/fileupload { deny all; }

Restrict File Upload Permissions

all

Configure the application to run with minimal file system permissions and restrict write access

# Linux example
chmod 755 /path/to/trufusion/directories
# Windows example
icacls C:\Program Files\TRUfusion\ /deny "Users":(OI)(CI)W

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate TRUfusion servers from critical systems
  • Deploy file integrity monitoring to detect unauthorized file writes to sensitive directories

🔍 How to Verify

Check if Vulnerable:

Test if /trufusionPortal/fileupload endpoint accepts requests with path traversal sequences (e.g., ../../../malicious.jsp in filename parameter)

Check Version:

Check TRUfusion Enterprise version in administration console or configuration files

Verify Fix Applied:

Verify that path traversal attempts are rejected and file uploads are restricted to intended directories

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /trufusionPortal/fileupload with ../ sequences in parameters
  • File creation events in unexpected directories from the TRUfusion process

Network Indicators:

  • Unusual outbound connections from TRUfusion servers
  • HTTP POST requests to fileupload endpoint from untrusted sources

SIEM Query:

source="trufusion.log" AND (uri="/trufusionPortal/fileupload" AND (param="filename" AND value="*../*"))

🔗 References

📤 Share & Export