CVE-2025-45890

9.8 CRITICAL

📋 TL;DR

A directory traversal vulnerability in novel plus allows remote attackers to read, write, or execute arbitrary files on the server by manipulating the filePath parameter. This affects all novel plus installations before version 5.1.0, potentially leading to complete system compromise.

💻 Affected Systems

Products:
  • novel plus
Versions: All versions before 5.1.0
Operating Systems: All platforms running novel plus
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the filePath parameter handling, affecting all default installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data exfiltration, ransomware deployment, or creation of persistent backdoors.

🟠

Likely Case

Arbitrary file read/write allowing sensitive data exposure, configuration file modification, or web shell upload for subsequent RCE.

🟢

If Mitigated

Limited file access within web root directory if proper input validation and path restrictions are implemented.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication and has a CVSS score of 9.8.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to authenticated or unauthenticated attacks depending on configuration.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal vulnerabilities are typically easy to exploit with simple path manipulation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.1.0

Vendor Advisory: https://github.com/SecureCore1/CVE/blob/main/novel-plus/readme.md

Restart Required: Yes

Instructions:

1. Backup current installation and data. 2. Download novel plus version 5.1.0 or later from official source. 3. Replace existing files with patched version. 4. Restart the novel plus service or web server.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation to block directory traversal sequences in filePath parameter

# Example for web server config or application filter
# Block sequences containing ../, ..\, or absolute paths

Web Application Firewall Rule

all

Deploy WAF rules to detect and block directory traversal attempts

# Example ModSecurity rule:
# SecRule ARGS:filePath "@contains ../" "id:1001,phase:2,deny,msg:'Directory Traversal Attempt'"
# Example nginx rule:
# location ~* \.\./ { deny all; }

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to novel plus instances
  • Deploy runtime application self-protection (RASP) or web application firewall with directory traversal detection rules

🔍 How to Verify

Check if Vulnerable:

Test if filePath parameter accepts directory traversal sequences like ../../../etc/passwd or similar path manipulations

Check Version:

Check novel plus version in admin panel or configuration files, or run: grep -r 'version' /path/to/novel-plus/ | grep -i '5\|version'

Verify Fix Applied:

After patching, attempt directory traversal attacks and verify they are blocked or sanitized

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with filePath parameter containing ../, ..\, or absolute paths
  • Unusual file access patterns outside web root directory
  • Failed file access attempts with traversal sequences

Network Indicators:

  • HTTP requests with encoded traversal sequences (%2e%2e%2f, ..%5c)
  • Multiple rapid requests attempting different path manipulations

SIEM Query:

source="web_logs" AND (filePath="*../*" OR filePath="*..\\*" OR filePath="*/etc/*" OR filePath="*C:\\*" OR filePath="*/windows/*")

🔗 References

📤 Share & Export