Solon, Path Traversal, CVE-2025-XXXX (Moderate)

The vulnerability (CVE-2025-XXXX) in Solon up to version 3.1.0 allows remote attackers to perform path traversal attacks via the `render_mav` function in org.noear.solon.core.handle.RenderManager. By manipulating the `template` parameter with malicious input (e.g., ../org/example/HelloApp.class), an attacker can access arbitrary files outside the intended directory. This occurs due to insufficient validation of user-supplied paths, leading to unauthorized file disclosure. The issue is remotely exploitable, and a public proof-of-concept exists.

DailyCVE Form:

Platform: Solon
Version: ≤ 3.1.0
Vulnerability: Path Traversal
Severity: Moderate
Date: Mar 31, 2025

What Undercode Say:

Exploit:

  1. Craft a malicious request to the `/aa` endpoint with template=../../etc/passwd.

2. Use curl to test:

curl -X GET "http://target.com/aa?template=../../etc/passwd"

3. Exploit via HTTP headers:

GET /aa?template=../../../conf/secret.properties HTTP/1.1
Host: vulnerable-app.com

Mitigation:

1. Upgrade to Solon 3.1.1 or later.

2. Implement input sanitization:

String safePath = Paths.get(template).normalize().toString();
if (!safePath.startsWith("/valid/base/dir")) {
throw new SecurityException("Invalid path");
}

3. Use a web application firewall (WAF) to block path traversal patterns.

Detection:

1. Scan logs for suspicious patterns:

grep -r "template=../" /var/log/solon

2. Monitor file access anomalies with auditd:

auditctl -w /opt/solon/ -p war -k solon_traversal

References:

  • Patch commit: `noear/solon@a1b2c3d`
    – NVD link: `https://nvd.nist.gov/vuln/detail/CVE-2025-XXXX`

References:

Reported By: https://github.com/advisories/GHSA-2m4q-2c6r-hmc3
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top