CVE-2025-9153

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to upload arbitrary files to the Online Tour and Travel Management System 1.0 via the photo parameter in /admin/operations/travellers.php. This can lead to server compromise through malicious file execution. All users running version 1.0 of this software are affected.

💻 Affected Systems

Products:
  • itsourcecode Online Tour and Travel Management System
Versions: 1.0
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the /admin/operations/travellers.php endpoint to be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Webshell deployment allowing persistent access, data exfiltration, and further exploitation of the server.

🟢

If Mitigated

File uploads restricted to safe extensions with proper validation, limiting impact to denial of service or storage consumption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available on GitHub. Attack requires access to the admin interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Remove or replace the vulnerable software.

🔧 Temporary Workarounds

Restrict file upload extensions

all

Modify travellers.php to only allow specific image file extensions (jpg, png, gif) and implement file type verification.

Disable admin interface access

all

Restrict access to /admin/operations/travellers.php via web server configuration or firewall rules.

# Apache: <Location /admin/operations/travellers.php> Require all denied </Location>
# Nginx: location /admin/operations/travellers.php { deny all; }

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block malicious file uploads
  • Monitor file upload directory for suspicious files and implement file integrity monitoring

🔍 How to Verify

Check if Vulnerable:

Attempt to upload a non-image file (e.g., .php, .exe) via the photo parameter in /admin/operations/travellers.php. If successful, system is vulnerable.

Check Version:

Check software documentation or admin panel for version information.

Verify Fix Applied:

Attempt the same upload test; successful uploads should be rejected with proper validation errors.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /admin/operations/travellers.php
  • Uploads of non-image file types
  • Large or suspicious files in upload directories

Network Indicators:

  • POST requests to /admin/operations/travellers.php with file uploads
  • Unusual outbound connections from the web server

SIEM Query:

source="web_server" AND uri="/admin/operations/travellers.php" AND method="POST" AND file_upload="true"

🔗 References

📤 Share & Export