CVE-2025-7450

5.4 MEDIUM

📋 TL;DR

This critical vulnerability in gorobbs allows remote attackers to perform path traversal attacks via the filename parameter in the ResetUserAvatar API function. Attackers can potentially read, modify, or delete arbitrary files on the server. All users running gorobbs versions up to 1.0.8 are affected.

💻 Affected Systems

Products:
  • letseeqiji gorobbs
Versions: up to 1.0.8
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the API component specifically in controller/api/v1/user.go

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through arbitrary file read/write/delete, potentially leading to sensitive data exposure, system takeover, or ransomware deployment.

🟠

Likely Case

Unauthorized access to sensitive files (configuration files, user data, source code) and potential privilege escalation.

🟢

If Mitigated

Limited impact if proper input validation and file system permissions restrict access to non-critical directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit disclosed in public GitHub issue; requires API access but authentication requirements unclear from available information

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: Yes

Instructions:

1. Monitor GitHub repository for patches. 2. Apply patch when available. 3. Restart gorobbs service. 4. Verify fix by testing path traversal attempts.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to reject filename parameters containing path traversal sequences

Implement validation in ResetUserAvatar function to block '../', '..\\', and similar sequences

API Access Restriction

all

Restrict access to vulnerable API endpoint using network controls

Configure firewall/load balancer to block access to /api/v1/user/resetavatar endpoint

🧯 If You Can't Patch

  • Disable the ResetUserAvatar API endpoint entirely if not required
  • Implement Web Application Firewall (WAF) rules to block path traversal patterns in API requests

🔍 How to Verify

Check if Vulnerable:

Check gorobbs version; if ≤1.0.8, test API endpoint with path traversal payloads in filename parameter

Check Version:

Check gorobbs configuration or package manager for version information

Verify Fix Applied:

Test with path traversal payloads after applying fixes; successful attempts should be blocked

📡 Detection & Monitoring

Log Indicators:

  • API requests to ResetUserAvatar with suspicious filename parameters containing '../', '..\\'

Network Indicators:

  • Unusual file access patterns from API endpoints

SIEM Query:

source="gorobbs" AND (uri="/api/v1/user/resetavatar" AND filename MATCHES "*../*")

🔗 References

📤 Share & Export