CVE-2025-29453

6.5 MEDIUM

📋 TL;DR

This vulnerability in Personal Management System 1.4.65 allows remote attackers to access sensitive information through the my-contacts-settings component. It affects all users running the vulnerable version of this personal information management software. The issue is classified under CWE-918 (Server-Side Request Forgery) which typically involves forcing a server to make unauthorized requests.

💻 Affected Systems

Products:
  • Personal Management System
Versions: 1.4.65
Operating Systems: All platforms running the vulnerable software
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the my-contacts-settings component specifically. All installations of version 1.4.65 are vulnerable unless specifically patched or configured with workarounds.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all contact information and personal data stored in the system, potentially including names, addresses, phone numbers, email addresses, and other sensitive personal information.

🟠

Likely Case

Unauthorized access to contact lists and personal information stored in the my-contacts-settings component, potentially leading to data privacy violations and information disclosure.

🟢

If Mitigated

Limited exposure of non-critical configuration data or partial contact information if proper access controls and input validation are implemented.

🌐 Internet-Facing: HIGH - The vulnerability allows remote exploitation, making internet-facing instances particularly vulnerable to attacks from anywhere on the internet.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable to insider threats or attackers who have gained internal network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Based on the CVSS score of 6.5 and CWE-918 classification, exploitation likely requires minimal technical skill. The vulnerability allows remote exploitation without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - check vendor for updates

Vendor Advisory: https://www.yuque.com/morysummer/vx41bz/pgg9q7kdbkggtq08

Restart Required: No

Instructions:

1. Monitor the vendor's repository for security updates. 2. When a patch is released, download the updated version. 3. Replace the vulnerable files with patched versions. 4. Verify the fix by testing the my-contacts-settings component.

🔧 Temporary Workarounds

Disable or Restrict Access to my-contacts-settings

all

Temporarily disable or restrict access to the vulnerable component while waiting for an official patch.

# Modify web server configuration to block access to the vulnerable endpoint
# Example for Apache: RewriteRule ^/my-contacts-settings - [F]
# Example for Nginx: location ~ /my-contacts-settings { deny all; }

Implement Web Application Firewall Rules

all

Configure WAF rules to block malicious requests targeting the my-contacts-settings endpoint.

# Add WAF rule to block requests to /my-contacts-settings
# Example ModSecurity rule: SecRule REQUEST_URI "@contains my-contacts-settings" "id:1001,phase:1,deny"

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the Personal Management System
  • Monitor logs for unusual access patterns to the my-contacts-settings endpoint

🔍 How to Verify

Check if Vulnerable:

Check if you're running Personal Management System version 1.4.65. Attempt to access the my-contacts-settings component from an unauthorized context to test for information disclosure.

Check Version:

# Check the version in the application interface or configuration files
# Look for version information in the application's admin panel or about page

Verify Fix Applied:

After applying workarounds or patches, test that the my-contacts-settings component no longer discloses sensitive information to unauthorized users.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /my-contacts-settings endpoint
  • Multiple failed or successful requests to the vulnerable component from unusual IPs
  • Requests with suspicious parameters targeting the contacts settings

Network Indicators:

  • Unusual outbound requests from the server following access to my-contacts-settings
  • Traffic patterns indicating data exfiltration

SIEM Query:

source="web_server_logs" AND (uri="/my-contacts-settings" OR uri CONTAINS "my-contacts-settings") AND (src_ip NOT IN [authorized_ips])

🔗 References

📤 Share & Export