CVE-2025-34320

N/A Unknown

📋 TL;DR

This vulnerability allows unauthenticated attackers to perform directory traversal attacks on BASIS BBj servers, reading arbitrary system files accessible to the service account. Attackers can retrieve configuration files containing credentials for BBj Enterprise Manager, leading to administrative access and potential remote code execution. All BASIS BBj installations prior to version 25.00 are affected.

💻 Affected Systems

Products:
  • BASIS BBj
Versions: All versions prior to 25.00
Operating Systems: All operating systems running BBj
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable Jetty-served web endpoint is part of default BBj installations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via credential theft leading to administrative access and remote code execution, potentially allowing lateral movement and data exfiltration.

🟠

Likely Case

Unauthenticated attackers read sensitive configuration files, steal credentials, gain administrative access to BBj Enterprise Manager, and execute system commands under the service account.

🟢

If Mitigated

Attackers can only read files accessible to the service account but cannot escalate privileges or execute commands due to network segmentation and credential protection.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal attacks are well-understood and easy to automate; credential theft leads directly to administrative access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.00

Vendor Advisory: https://myemail.constantcontact.com/BASIS-International-Ltd--releases-BBj---the-Barista--Application-Framework--and-AddonSoftware--by-Barista-version-25-00.html?soid=1103463119019&aid=WbfWkReLRVE

Restart Required: Yes

Instructions:

1. Download BASIS BBj version 25.00 or later from official vendor sources. 2. Backup current installation and data. 3. Install the new version following vendor documentation. 4. Restart all BBj services.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to the vulnerable Jetty endpoint using firewall rules.

Service Account Privilege Reduction

all

Run BBj service under a low-privilege account with minimal file system access.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate BBj servers from untrusted networks.
  • Monitor and alert on unusual file access patterns from the BBj service account.

🔍 How to Verify

Check if Vulnerable:

Check BBj version; if below 25.00, the system is vulnerable. Test with controlled directory traversal payloads against the Jetty endpoint.

Check Version:

Check BBj documentation for version command; typically involves checking application logs or configuration files.

Verify Fix Applied:

Confirm BBj version is 25.00 or higher and test that directory traversal attempts against the Jetty endpoint are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in BBj logs
  • Multiple failed or successful attempts to access configuration files via web requests
  • Authentication logs showing administrative access from unexpected sources

Network Indicators:

  • HTTP requests containing directory traversal sequences (e.g., '../', '..\') to BBj endpoints
  • Unusual outbound connections from BBj servers after credential theft

SIEM Query:

source="bbj_logs" AND (uri="*../*" OR uri="*..\\*")

🔗 References

📤 Share & Export