CVE-2025-3587

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in ZeroWdd/code-projects studentmanager 1.0 allows unauthorized access to the /getTeacherList endpoint due to improper authorization controls. Attackers can remotely exploit this to access sensitive teacher information without proper authentication. Anyone running studentmanager 1.0 with the vulnerable endpoint exposed is affected.

💻 Affected Systems

Products:
  • ZeroWdd/code-projects studentmanager
Versions: 1.0
Operating Systems: All platforms running the application
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the /getTeacherList endpoint accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete unauthorized access to all teacher data including potentially sensitive personal information, leading to data breach and privacy violations.

🟠

Likely Case

Unauthorized viewing of teacher lists and associated data, potentially enabling further attacks through information disclosure.

🟢

If Mitigated

No impact if proper authorization controls are implemented or endpoint is properly secured.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and public exploit details exist.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this if they have network access to the application.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available in GitHub repositories, making this easy to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider implementing proper authorization checks in the /getTeacherList endpoint code or using workarounds.

🔧 Temporary Workarounds

Implement Authorization Middleware

all

Add proper authentication and authorization checks before processing /getTeacherList requests

Implement session validation or token-based authentication in the endpoint handler

Restrict Endpoint Access

all

Use web server configuration to restrict access to /getTeacherList endpoint

# Apache: <Location /getTeacherList> Require valid-user </Location>
# Nginx: location /getTeacherList { auth_basic "Restricted"; auth_basic_user_file /path/to/.htpasswd; }

🧯 If You Can't Patch

  • Implement network-level access controls to restrict who can reach the application
  • Monitor access logs for unauthorized requests to /getTeacherList endpoint

🔍 How to Verify

Check if Vulnerable:

Test if /getTeacherList endpoint returns data without proper authentication by making an unauthenticated HTTP request to the endpoint.

Check Version:

Check application version in configuration files or about page if available.

Verify Fix Applied:

Verify that unauthenticated requests to /getTeacherList return proper authorization errors (401/403) instead of data.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated requests to /getTeacherList returning 200 OK status
  • Multiple failed authentication attempts followed by successful /getTeacherList access

Network Indicators:

  • Unusual traffic patterns to /getTeacherList endpoint
  • Requests to /getTeacherList without authentication headers or cookies

SIEM Query:

source="web_server_logs" AND (uri="/getTeacherList" AND status="200") AND NOT (auth_token EXISTS OR session_id EXISTS)

🔗 References

📤 Share & Export