CVE-2025-34337
📋 TL;DR
This vulnerability in eGovFramework's common components allows unauthenticated attackers to bypass access controls and retrieve arbitrary stored files. Attackers can abuse image upload endpoints as encryption oracles to generate valid ciphertexts, then replay them to file-serving APIs. All systems running eGovFramework/egovframe-common-components up to version 4.3.1 are affected.
💻 Affected Systems
- eGovFramework/egovframe-common-components
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of sensitive files including configuration files, credentials, personal data, and system files leading to full system compromise.
Likely Case
Unauthenticated file disclosure of sensitive information stored on the server, potentially including user data, configuration files, and application source code.
If Mitigated
Limited impact if proper file system permissions and additional authentication layers are in place, though encryption bypass still possible.
🎯 Exploit Status
Detailed exploitation steps are publicly documented in security advisories, making exploitation straightforward for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: https://www.egovframe.go.kr/eng/sub.do?menuNo=2
Restart Required: No
Instructions:
No official patch available. Monitor vendor channels for updates and apply immediately when released.
🔧 Temporary Workarounds
Disable vulnerable endpoints
allBlock access to the vulnerable image upload endpoints to prevent exploitation
# In web server configuration (Apache example):
RewriteRule ^/utl/wed/insertImage\.do$ - [F]
RewriteRule ^/utl/wed/insertImageCk\.do$ - [F]
Implement WAF rules
allAdd web application firewall rules to block exploitation attempts
# Example ModSecurity rule:
SecRule REQUEST_URI "@rx ^/(utl/wed/insertImage\.do|utl/wed/insertImageCk\.do|cmm/fms/getImage\.do|utl/web/imageSrc\.do)" \
"id:1001,phase:1,deny,status:403,msg:'Blocking eGovFramework exploit attempt'
🧯 If You Can't Patch
- Implement network segmentation to isolate affected systems from untrusted networks
- Deploy additional authentication layers and file access controls independent of the vulnerable encryption mechanism
🔍 How to Verify
Check if Vulnerable:
Check if your application uses eGovFramework/egovframe-common-components version 4.3.1 or earlier and has the Web Editor functionality enabled. Test by attempting to access /utl/wed/insertImage.do endpoint.
Check Version:
# Check Maven dependencies or project configuration for: egovframe-common-components version <= 4.3.1
Verify Fix Applied:
Verify that the vulnerable endpoints are no longer accessible or that proper authentication and authorization checks are in place for file access.
📡 Detection & Monitoring
Log Indicators:
- Multiple requests to /utl/wed/insertImage.do or /utl/wed/insertImageCk.do followed by requests to /cmm/fms/getImage.do or /utl/web/imageSrc.do with encrypted parameters
- Unusual file access patterns from unauthenticated users
Network Indicators:
- HTTP requests to vulnerable endpoints from external IPs without authentication
- Pattern of upload followed by file retrieval requests
SIEM Query:
source_ip=* AND (uri_path="/utl/wed/insertImage.do" OR uri_path="/utl/wed/insertImageCk.do") AND (uri_path="/cmm/fms/getImage.do" OR uri_path="/utl/web/imageSrc.do") WITHIN 60s
🔗 References
- https://github.com/eGovFramework/egovframe-common-components
- https://pierrekim.github.io/advisories/2025-egovframe.txt
- https://pierrekim.github.io/blog/2025-11-20-egovframe-2-vulnerabilities.html
- https://www.egovframe.go.kr/eng/sub.do?menuNo=2
- https://www.vulncheck.com/advisories/egovframework-unauthenticated-encryption-oracle-via-web-editor-image-upload-endpoints