CVE-2025-70029

7.5 HIGH

📋 TL;DR

This vulnerability in Sunbird-Ed portal version 1.13.4 disables TLS/SSL certificate validation, allowing attackers to intercept and potentially modify HTTPS traffic. Any organization using the vulnerable version is affected, particularly those deploying the portal in environments where it makes external API calls.

💻 Affected Systems

Products:
  • SunbirdEd-portal
Versions: v1.13.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default configuration where 'rejectUnauthorized': false is set in HTTP request options.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers perform man-in-the-middle attacks to intercept sensitive data (credentials, API keys, user information) and potentially inject malicious content into responses.

🟠

Likely Case

Information disclosure through intercepted API responses containing user data or system information in environments with compromised network security.

🟢

If Mitigated

Limited impact if deployed in isolated networks with strict egress controls and no external API dependencies.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access to intercept traffic between the vulnerable application and its HTTPS endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.13.5 or later

Vendor Advisory: https://github.com/Sunbird-Ed/SunbirdEd-portal

Restart Required: No

Instructions:

1. Update to v1.13.5 or later from the official GitHub repository. 2. Verify the fix by checking that 'rejectUnauthorized' is set to true or removed from HTTP request options.

🔧 Temporary Workarounds

Enable certificate validation

all

Manually modify the application code to set 'rejectUnauthorized': true in all HTTP/HTTPS request configurations.

Find and replace all instances of 'rejectUnauthorized: false' with 'rejectUnauthorized: true' in the codebase

🧯 If You Can't Patch

  • Deploy network segmentation to isolate the vulnerable system from untrusted networks
  • Implement strict egress filtering to limit the application's external HTTPS connections to trusted endpoints only

🔍 How to Verify

Check if Vulnerable:

Search the codebase for 'rejectUnauthorized: false' in HTTP/HTTPS request configurations. If found in v1.13.4, the system is vulnerable.

Check Version:

Check package.json for version number or run: npm list sunbird-ed-portal

Verify Fix Applied:

Verify that 'rejectUnauthorized: false' is not present in the codebase and that HTTPS requests properly validate certificates.

📡 Detection & Monitoring

Log Indicators:

  • Failed HTTPS connections due to certificate validation errors (should appear after fix)

Network Indicators:

  • Unencrypted or improperly encrypted traffic to/from the application

SIEM Query:

Search for network traffic patterns showing HTTPS requests to untrusted certificates from the application server

🔗 References

📤 Share & Export