CVE-2025-7552
📋 TL;DR
This critical vulnerability in Dromara Northstar allows attackers to bypass authorization controls by manipulating request arguments in the preHandle function. It enables unauthorized access to protected resources and can be exploited remotely. All systems running Northstar versions up to 7.3.5 are affected.
💻 Affected Systems
- Dromara Northstar
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through privilege escalation, allowing attackers to access sensitive data, modify configurations, or execute arbitrary code with elevated privileges.
Likely Case
Unauthorized access to administrative functions, data exfiltration, or manipulation of application settings leading to service disruption.
If Mitigated
Limited impact with proper network segmentation and additional authentication layers, potentially only exposing non-sensitive endpoints.
🎯 Exploit Status
Exploitation requires understanding of request manipulation but appears straightforward based on the vulnerability description.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.3.6
Vendor Advisory: https://gitee.com/dromara/northstar/releases/tag/v7.3.6
Restart Required: Yes
Instructions:
1. Download Northstar version 7.3.6 from official repository
2. Stop the running Northstar service
3. Replace the existing installation with version 7.3.6
4. Restart the Northstar service
5. Verify the patch is applied by checking the version
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict network access to Northstar endpoints using firewall rules to limit exposure.
iptables -A INPUT -p tcp --dport [northstar_port] -s [trusted_ips] -j ACCEPT
iptables -A INPUT -p tcp --dport [northstar_port] -j DROP
🧯 If You Can't Patch
- Implement Web Application Firewall (WAF) rules to block suspicious request patterns targeting the authorization interceptor.
- Deploy additional authentication layers such as API gateways with strict access controls.
🔍 How to Verify
Check if Vulnerable:
Check the Northstar version by examining the application properties or running the application with --version flag.
Check Version:
java -jar northstar.jar --version
Verify Fix Applied:
Verify the installed version is 7.3.6 or higher and confirm the commit hash includes 8d521bbf531de59b09b8629a9cbf667870ad2541.
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to protected endpoints
- Failed authorization attempts followed by successful access
- Requests with manipulated parameters to the preHandle function
Network Indicators:
- Unusual HTTP request patterns targeting the authorization interceptor
- Requests bypassing expected authentication flows
SIEM Query:
source="northstar" AND (event="AUTHORIZATION_BYPASS" OR status="403" AND subsequent_status="200")
🔗 References
- https://gitee.com/dromara/northstar/commit/8d521bbf531de59b09b8629a9cbf667870ad2541
- https://gitee.com/dromara/northstar/issues/ICCQ4E
- https://gitee.com/dromara/northstar/issues/ICCQ4E#note_42855013_link
- https://gitee.com/dromara/northstar/releases/tag/v7.3.6
- https://vuldb.com/?ctiid.316250
- https://vuldb.com/?id.316250
- https://gitee.com/dromara/northstar/issues/ICCQ4E
- https://gitee.com/dromara/northstar/issues/ICCQ4E#note_42855013_link