CVE-2025-7552

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in Dromara Northstar allows attackers to bypass authorization controls by manipulating request arguments in the preHandle function. It enables unauthorized access to protected resources and can be exploited remotely. All systems running Northstar versions up to 7.3.5 are affected.

💻 Affected Systems

Products:
  • Dromara Northstar
Versions: Up to and including 7.3.5
Operating Systems: All platforms running Java
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using the affected component are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through privilege escalation, allowing attackers to access sensitive data, modify configurations, or execute arbitrary code with elevated privileges.

🟠

Likely Case

Unauthorized access to administrative functions, data exfiltration, or manipulation of application settings leading to service disruption.

🟢

If Mitigated

Limited impact with proper network segmentation and additional authentication layers, potentially only exposing non-sensitive endpoints.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires understanding of request manipulation but appears straightforward based on the vulnerability description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.3.6

Vendor Advisory: https://gitee.com/dromara/northstar/releases/tag/v7.3.6

Restart Required: Yes

Instructions:

1. Download Northstar version 7.3.6 from official repository
2. Stop the running Northstar service
3. Replace the existing installation with version 7.3.6
4. Restart the Northstar service
5. Verify the patch is applied by checking the version

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to Northstar endpoints using firewall rules to limit exposure.

iptables -A INPUT -p tcp --dport [northstar_port] -s [trusted_ips] -j ACCEPT
iptables -A INPUT -p tcp --dport [northstar_port] -j DROP

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block suspicious request patterns targeting the authorization interceptor.
  • Deploy additional authentication layers such as API gateways with strict access controls.

🔍 How to Verify

Check if Vulnerable:

Check the Northstar version by examining the application properties or running the application with --version flag.

Check Version:

java -jar northstar.jar --version

Verify Fix Applied:

Verify the installed version is 7.3.6 or higher and confirm the commit hash includes 8d521bbf531de59b09b8629a9cbf667870ad2541.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to protected endpoints
  • Failed authorization attempts followed by successful access
  • Requests with manipulated parameters to the preHandle function

Network Indicators:

  • Unusual HTTP request patterns targeting the authorization interceptor
  • Requests bypassing expected authentication flows

SIEM Query:

source="northstar" AND (event="AUTHORIZATION_BYPASS" OR status="403" AND subsequent_status="200")

🔗 References

📤 Share & Export