CVE-2025-8841

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to upload arbitrary files to zlt2000 microservices-platform servers without proper restrictions. Affected systems are zlt2000 microservices-platform installations up to version 6.0.0. The vulnerability exists in the file upload function of the file-center component.

💻 Affected Systems

Products:
  • zlt2000 microservices-platform
Versions: up to 6.0.0
Operating Systems: Any platform running Java
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the file-center component specifically. All deployments using vulnerable versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution via malicious file upload leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Unauthorized file storage, potential for malware distribution, or denial of service through disk space exhaustion.

🟢

If Mitigated

Limited impact with proper file validation, but still potential for unauthorized file storage.

🌐 Internet-Facing: HIGH - Remote exploitation possible without authentication.
🏢 Internal Only: MEDIUM - Internal attackers could exploit, but external threat reduced.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed in GitHub issues. Attack requires knowledge of the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.1 or later

Vendor Advisory: https://github.com/zlt2000/microservices-platform/issues/77

Restart Required: Yes

Instructions:

1. Update to version 6.0.1 or later. 2. Restart the microservices-platform application. 3. Verify the fix by testing file upload restrictions.

🔧 Temporary Workarounds

Implement file upload validation

all

Add server-side validation for file types, sizes, and names before processing uploads.

Implement file type whitelisting in FileController.java
Add size limits in application configuration

Disable file upload endpoint

all

Temporarily disable the vulnerable upload endpoint if not required.

Comment out or remove @RequestMapping for upload methods in FileController.java

🧯 If You Can't Patch

  • Implement web application firewall rules to block suspicious file upload patterns.
  • Restrict network access to the file upload endpoint using network segmentation.

🔍 How to Verify

Check if Vulnerable:

Check if running zlt2000 microservices-platform version 6.0.0 or earlier. Attempt to upload a file with restricted extension to test validation.

Check Version:

Check application.properties or pom.xml for version information, or use API endpoint if available.

Verify Fix Applied:

After updating, attempt to upload restricted file types - should be rejected. Check that version is 6.0.1 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload patterns
  • Uploads of executable files or scripts
  • Large number of upload requests from single IP

Network Indicators:

  • HTTP POST requests to /upload endpoints with suspicious file extensions
  • Unusual traffic to file-center component

SIEM Query:

source="application.log" AND "FileController" AND "upload" AND ("exe" OR "php" OR "jsp" OR suspicious_extension)

🔗 References

📤 Share & Export