CVE-2025-60803

9.8 CRITICAL

📋 TL;DR

Antabot White-Jotter contains an unauthenticated remote code execution vulnerability that allows attackers to execute arbitrary commands on affected systems without authentication. This affects all deployments running White-Jotter up to commit 9bcadc, potentially compromising the entire server.

💻 Affected Systems

Products:
  • Antabot White-Jotter
Versions: All versions up to commit 9bcadc
Operating Systems: Any OS running White-Jotter
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the vulnerable endpoint accessible are affected; no special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal data, pivot to other systems, or establish persistent backdoors.

🟠

Likely Case

Attackers gain shell access to the server, deploy cryptocurrency miners, ransomware, or use the system for further attacks.

🟢

If Mitigated

Attack blocked at network perimeter or application firewall; no impact if proper segmentation and controls exist.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit uses path traversal to bypass authentication and execute commands; trivial for attackers with basic knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit after 9bcadc

Vendor Advisory: https://github.com/Antabot/White-Jotter/issues/162

Restart Required: Yes

Instructions:

1. Update to latest White-Jotter version after commit 9bcadc. 2. Restart the application service. 3. Verify the /api/aaa;/../register endpoint is no longer accessible or properly secured.

🔧 Temporary Workarounds

Block Vulnerable Endpoint

all

Use web server or firewall to block access to the vulnerable endpoint

# For nginx: location ~* /api/aaa { deny all; }
# For Apache: <Location /api/aaa> Require all denied </Location>

Network Segmentation

linux

Restrict access to White-Jotter to trusted networks only

# Firewall rule example: iptables -A INPUT -p tcp --dport [WHITE-JOTTER-PORT] -s [TRUSTED-NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [WHITE-JOTTER-PORT] -j DROP

🧯 If You Can't Patch

  • Immediately isolate affected systems from internet and critical networks
  • Implement strict network monitoring and alerting for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Test if /api/aaa;/../register endpoint is accessible and responds without authentication

Check Version:

git log --oneline -1 (to check current commit hash)

Verify Fix Applied:

Verify the endpoint returns proper authentication error or 404 after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST/GET requests to /api/aaa;/../register
  • System command execution from web process
  • Failed authentication attempts followed by successful access

Network Indicators:

  • Unusual outbound connections from White-Jotter server
  • Traffic patterns suggesting command execution

SIEM Query:

source="web_access.log" AND (uri="/api/aaa*" OR uri="*/../register")

🔗 References

📤 Share & Export