CVE-2025-67076

7.5 HIGH

📋 TL;DR

This directory traversal vulnerability in Omnispace Agora Project allows unauthenticated attackers to read arbitrary files with extensions from the server filesystem. Attackers can exploit the misc controller's ExternalGetFile action to access sensitive system files. All systems running Agora Project versions before 25.10 are affected.

💻 Affected Systems

Products:
  • Omnispace Agora Project
Versions: All versions before 25.10
Operating Systems: Any OS running Agora Project
Default Config Vulnerable: ⚠️ Yes
Notes: Only files with extensions can be read, which excludes some sensitive files but still includes many critical configuration files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive configuration files, credentials, database files, or application source code, potentially leading to complete system compromise.

🟠

Likely Case

Attackers will read configuration files containing database credentials, API keys, or other sensitive information that can be used for further attacks.

🟢

If Mitigated

With proper file permissions and network segmentation, impact is limited to reading non-sensitive files within the web application directory.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit via crafted HTTP requests to the misc controller endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.10

Vendor Advisory: https://www.agora-project.net

Restart Required: Yes

Instructions:

1. Download Agora Project version 25.10 or later from the official website. 2. Backup your current installation. 3. Replace the existing installation with the patched version. 4. Restart the Agora Project service.

🔧 Temporary Workarounds

Block misc controller access

all

Temporarily block access to the vulnerable misc controller endpoint via web server configuration.

# For Apache: RewriteRule ^/misc/ExternalGetFile - [F]
# For Nginx: location ~ /misc/ExternalGetFile { return 403; }

Restrict file permissions

linux

Set strict file permissions to limit what files the web server user can read.

chmod 600 sensitive_config_files
chown root:root sensitive_config_files

🧯 If You Can't Patch

  • Implement network-level controls to restrict access to the Agora Project instance to trusted IP addresses only.
  • Deploy a web application firewall (WAF) with directory traversal protection rules enabled.

🔍 How to Verify

Check if Vulnerable:

Test by sending a crafted request to the misc controller with directory traversal payload (e.g., GET /misc/ExternalGetFile?file=../../etc/passwd). If the server returns the file content, it's vulnerable.

Check Version:

Check the Agora Project admin interface or configuration files for version information.

Verify Fix Applied:

After patching, repeat the test request. The server should return an error or empty response instead of file content.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '..' or '../' patterns in the URL or parameters
  • Requests to /misc/ExternalGetFile with unusual file paths

Network Indicators:

  • Unusual file read patterns from external IP addresses
  • Multiple failed attempts to access sensitive file paths

SIEM Query:

source="web_server_logs" AND (url="*../*" OR url="*/misc/ExternalGetFile*")

🔗 References

📤 Share & Export