CVE-2025-3410

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in mymagicpower AIAS allows remote attackers to upload arbitrary files without restrictions, potentially leading to remote code execution. It affects systems running AIAS version 20250308 with the vulnerable LocalStorageController component. Organizations using this AI training platform are at risk.

💻 Affected Systems

Products:
  • mymagicpower AIAS
Versions: 20250308
Operating Systems: Any OS running Java applications
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the training platform component specifically; requires the LocalStorageController endpoint to be accessible

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and lateral movement within the network

🟠

Likely Case

File upload leading to web shell deployment and subsequent command execution on the server

🟢

If Mitigated

File upload attempts blocked or logged with no execution capability

🌐 Internet-Facing: HIGH - Attack can be initiated remotely without authentication
🏢 Internal Only: MEDIUM - Still exploitable from internal networks but requires network access

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on GitHub; simple file upload manipulation leads to RCE

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor was contacted but did not respond. Consider workarounds or alternative solutions.

🔧 Temporary Workarounds

Web Application Firewall Rules

all

Implement WAF rules to block file uploads to the vulnerable endpoint

# Example ModSecurity rule: SecRule REQUEST_URI "@contains /training_platform/train-platform/src/main/java/top/aias/training/controller/LocalStorageController" "id:1001,phase:1,deny"

Network Access Control

linux

Restrict access to the vulnerable endpoint using network controls

# Example iptables rule: iptables -A INPUT -p tcp --dport [PORT] -m string --string "LocalStorageController" --algo bm -j DROP

🧯 If You Can't Patch

  • Isolate the AIAS system in a segmented network with strict egress filtering
  • Implement application-level input validation and file type restrictions

🔍 How to Verify

Check if Vulnerable:

Check if the file training_platform/train-platform/src/main/java/top/aias/training/controller/LocalStorageController.java exists and if version is 20250308

Check Version:

Check application configuration files or deployment manifests for version information

Verify Fix Applied:

Test file upload functionality with malicious extensions; successful upload indicates vulnerability

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to LocalStorageController endpoint
  • Files with executable extensions (.jsp, .war, .sh) being uploaded
  • Multiple failed upload attempts

Network Indicators:

  • HTTP POST requests to paths containing LocalStorageController
  • Uploads of unusually large files or files with suspicious extensions

SIEM Query:

source="web_logs" AND uri="*LocalStorageController*" AND (method="POST" OR method="PUT")

🔗 References

📤 Share & Export