CVE-2025-7875

7.3 HIGH

📋 TL;DR

This critical vulnerability in Metasoft MetaCRM allows attackers to bypass authentication via the /debug.jsp endpoint, potentially gaining unauthorized access to the CRM system. It affects all MetaCRM installations up to version 6.4.2 that have the vulnerable endpoint accessible.

💻 Affected Systems

Products:
  • Metasoft MetaCRM
Versions: Up to and including 6.4.2
Operating Systems: All platforms running MetaCRM
Default Config Vulnerable: ⚠️ Yes
Notes: The /debug.jsp endpoint appears to be part of default installations and is vulnerable when accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to access sensitive customer data, modify business records, or pivot to other systems.

🟠

Likely Case

Unauthorized access to CRM data including customer information, sales records, and business intelligence.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation.

🌐 Internet-Facing: HIGH - Attackers can exploit remotely without authentication, making internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available on GitHub, making this easily exploitable by attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor has not responded to disclosure. Consider upgrading to any version beyond 6.4.2 if available, or implement workarounds.

🔧 Temporary Workarounds

Block /debug.jsp Access

all

Restrict access to the vulnerable endpoint using web server configuration or firewall rules.

# Apache: RewriteRule ^/debug\.jsp$ - [F,L]
# Nginx: location = /debug.jsp { deny all; }
# IIS: Add request filter for /debug.jsp

Remove debug.jsp File

all

Physically delete or rename the vulnerable file from the web application directory.

# Linux: rm /path/to/webapp/debug.jsp
# Windows: del C:\path\to\webapp\debug.jsp

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MetaCRM instances from untrusted networks
  • Deploy web application firewall (WAF) with rules to block requests to /debug.jsp

🔍 How to Verify

Check if Vulnerable:

Attempt to access https://your-metacrm-instance/debug.jsp. If it returns content or doesn't return a 403/404 error, the system may be vulnerable.

Check Version:

Check MetaCRM version through admin interface or application metadata files. No standard CLI command available.

Verify Fix Applied:

After implementing workarounds, verify that accessing /debug.jsp returns appropriate error (403 Forbidden or 404 Not Found).

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /debug.jsp with successful (200) responses
  • Unusual authentication attempts or successful logins from unexpected sources

Network Indicators:

  • Outbound traffic from MetaCRM server to unexpected destinations
  • Increased traffic to /debug.jsp endpoint

SIEM Query:

web.url = "*/debug.jsp" AND http.status = 200

🔗 References

📤 Share & Export