CVE-2026-3719

5.3 MEDIUM

📋 TL;DR

This CVE describes a path traversal vulnerability in Tsinghua Unigroup Electronic Archives System version 3.2.210802(62532). Attackers can remotely exploit the /System/Cms/downLoad endpoint to read arbitrary files on the server by manipulating the 'path' parameter. Organizations using this specific version of the electronic archives system are affected.

💻 Affected Systems

Products:
  • Tsinghua Unigroup Electronic Archives System
Versions: 3.2.210802(62532)
Operating Systems: Unknown - likely Windows or Linux server environments
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific build number 62532 of version 3.2.210802

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, or user data, potentially leading to full system compromise if credentials or other critical information is exposed.

🟠

Likely Case

Unauthorized file disclosure including configuration files, user data, or other sensitive information stored on the server.

🟢

If Mitigated

Limited to reading files accessible to the web server process, with no ability to write or execute files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available on GitHub, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor was contacted but did not respond. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block path traversal patterns in the 'path' parameter

Input Validation

all

Add server-side validation to sanitize the 'path' parameter and prevent directory traversal sequences

🧯 If You Can't Patch

  • Restrict network access to the system using firewall rules to only allow trusted IP addresses
  • Implement network segmentation to isolate the vulnerable system from sensitive data and other critical systems

🔍 How to Verify

Check if Vulnerable:

Test by attempting to access /System/Cms/downLoad?path=../../../../etc/passwd (Linux) or similar traversal patterns

Check Version:

Check system version through admin interface or configuration files

Verify Fix Applied:

Verify that path traversal attempts return error messages or are blocked, and that only intended files can be accessed

📡 Detection & Monitoring

Log Indicators:

  • Multiple requests to /System/Cms/downLoad with ../ patterns in parameters
  • Unusual file access patterns from web server process

Network Indicators:

  • HTTP requests containing path traversal sequences (../, ..\, etc.) in URL parameters

SIEM Query:

source="web_server" AND url="/System/Cms/downLoad" AND (parameter="path" AND value="*../*")

🔗 References

📤 Share & Export