CVE-2025-11337
BaseFortify
Publication date: 2025-10-06
Last updated on: 2025-10-06
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| four-faith | water_conservancy_informatization_platform | 2.2 |
| four-faith | water_conservancy_informatization_platform | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-11337 is a path traversal vulnerability in the Four-Faith Water Conservancy Informatization Platform up to version 2.2. It exists in the handling of the 'fileName' parameter in the '/aloneReport/index.do/../../aloneReport/download.do;othersusrlogout.do' endpoint. Due to insufficient input validation, attackers can manipulate this parameter to traverse directories and read arbitrary files on the server without authentication. This allows unauthorized access to sensitive files, such as configuration files, by crafting specific requests remotely. [1, 2, 3]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to read sensitive files on the affected server without any authentication. This compromises the confidentiality of data, potentially exposing sensitive configuration files or other critical information. Since the exploit is publicly available and easy to execute remotely, it increases the risk of unauthorized data disclosure and may lead to further attacks or system compromise. [1, 2, 3]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability can negatively affect compliance with standards and regulations such as GDPR and HIPAA because it exposes sensitive data through unauthorized file access, violating data confidentiality requirements. Organizations using the affected platform may fail to protect personal or sensitive information adequately, leading to potential legal and regulatory consequences. [2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by sending crafted HTTP GET requests to the vulnerable endpoint to test for path traversal. For example, you can use a command like: curl -v "http://<target-server>/aloneReport/index.do/../../aloneReport/download.do;othersusrlogout.do?fileName=../WEB-INF/classes/web.properties" to check if the server returns the contents of a sensitive file. A successful response indicates the vulnerability is present. [3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include implementing strict input validation on the 'fileName' parameter to prevent path traversal, enforcing file access controls to restrict unauthorized file reads, and conducting thorough security audits. Since no official patches or vendor responses are available, replacing the affected product with a secure alternative is recommended. Monitoring and blocking suspicious requests targeting the vulnerable endpoints can also help reduce risk. [2, 3]