CVE-2025-8516

5.3 MEDIUM

📋 TL;DR

This CVE describes a path traversal vulnerability in Kingdee Cloud-Starry-Sky Enterprise Edition that allows attackers to delete arbitrary files by manipulating the filePath parameter. The vulnerability affects systems running Kingdee Cloud-Starry-Sky Enterprise Edition up to version 8.2. Attackers can exploit this remotely without authentication.

💻 Affected Systems

Products:
  • Kingdee Cloud-Starry-Sky Enterprise Edition
Versions: Up to 8.2
Operating Systems: Windows (IIS-based deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the K3CloudMiniApp component deployed on IIS. The vulnerable class is in Kingdee.K3.O2O.Base.WebApp.jar.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete critical system files, configuration files, or application data, potentially causing system unavailability, data loss, or service disruption.

🟠

Likely Case

Attackers would delete application files, configuration files, or user-uploaded content to disrupt business operations or deface the application.

🟢

If Mitigated

With proper network segmentation and access controls, the impact would be limited to the application's own files and directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit has been publicly disclosed and can be initiated remotely without authentication. Attackers need to craft malicious filePath parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 8.2 (specific patch version not specified)

Vendor Advisory: https://vip.kingdee.com/link/s/ZgAmJ

Restart Required: No

Instructions:

1. Download the security patch from Kingdee's official website. 2. Apply the patch according to vendor instructions. 3. Verify the patch has been successfully applied.

🔧 Temporary Workarounds

Network Access Restriction

all

Temporarily disable external network access to the Kingdee Cloud Galaxy Retail System or implement IP whitelisting

Configure firewall rules to restrict access to the affected service

Interface Authentication

Windows/IIS

Add authentication to the vulnerable CMKAppWebHandler.ashx interface

Configure authentication in IIS for the specific endpoint

🧯 If You Can't Patch

  • Implement strict network segmentation and isolate the affected system from untrusted networks
  • Deploy a web application firewall (WAF) with path traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Check if the system is running Kingdee Cloud-Starry-Sky Enterprise Edition version 8.2 or earlier and has the vulnerable FileUploadAction.class file

Check Version:

Check the Kingdee system administration console or configuration files for version information

Verify Fix Applied:

Verify that the patch has been applied by checking the version number and that the vulnerable interface now requires authentication

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in application logs
  • HTTP requests to CMKAppWebHandler.ashx with suspicious filePath parameters containing '../' sequences

Network Indicators:

  • HTTP requests with path traversal sequences in filePath parameters
  • Unusual DELETE or POST requests to the vulnerable endpoint

SIEM Query:

source="*kingdee*" AND (uri="*CMKAppWebHandler.ashx*" AND (filePath="*../*" OR filePath="*..\\*"))

🔗 References

📤 Share & Export