CVE-2025-6089

4.3 MEDIUM

📋 TL;DR

This vulnerability in Astun Technology iShare Maps allows attackers to redirect users to malicious websites by manipulating the 'ref' parameter in atCheckJS.aspx. It affects iShare Maps version 5.4.0 and can be exploited remotely without authentication. Organizations using this specific version are at risk of phishing attacks.

💻 Affected Systems

Products:
  • Astun Technology iShare Maps
Versions: 5.4.0
Operating Systems: Any OS running iShare Maps
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific atCheckJS.aspx file with the ref parameter manipulation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be redirected to phishing sites that steal credentials or deliver malware, potentially leading to account compromise or system infection.

🟠

Likely Case

Attackers use the redirect for phishing campaigns to steal user credentials or distribute malware.

🟢

If Mitigated

With proper web application firewalls and user education, impact is limited to failed phishing attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit has been publicly disclosed and open redirect vulnerabilities are commonly weaponized for phishing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None provided

Restart Required: No

Instructions:

No official patch available. Contact Astun Technology for updates or consider upgrading to a newer version if available.

🔧 Temporary Workarounds

Input Validation for ref Parameter

all

Implement server-side validation to ensure the ref parameter only contains allowed URLs or domains.

Modify atCheckJS.aspx to validate ref parameter against whitelist

Web Application Firewall Rule

all

Add WAF rule to block requests with suspicious ref parameter values.

Add rule: Block requests where ref parameter contains external domains or suspicious patterns

🧯 If You Can't Patch

  • Implement strict input validation on the ref parameter to only allow known, trusted URLs
  • Deploy a web application firewall with rules to detect and block open redirect attempts

🔍 How to Verify

Check if Vulnerable:

Test by accessing atCheckJS.aspx with a malicious ref parameter value pointing to external domain

Check Version:

Check iShare Maps version in application interface or configuration files

Verify Fix Applied:

Test that ref parameter validation prevents redirects to unauthorized domains

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in web server logs
  • Requests to atCheckJS.aspx with external URLs in ref parameter

Network Indicators:

  • HTTP 302 redirects to unexpected domains from atCheckJS.aspx

SIEM Query:

web.url:*atCheckJS.aspx* AND web.query:ref=*http*

🔗 References

📤 Share & Export