SourceCodester Online Eyewear Shop 10, Information Disclosure, CVE-2025-2651 (Medium)

Listen to this Post

How CVE-2025-2651 Works

This vulnerability exposes sensitive directory listings in `/oews/admin/` due to misconfigured web server permissions. Attackers can remotely access directory contents without authentication, revealing files, scripts, or backup data. The issue stems from missing `IndexIgnore` or `Options -Indexes` directives in Apache/Nginx configurations. Directory traversal is possible via crafted HTTP requests (e.g., GET /oews/admin/../), enabling unauthorized access to adjacent directories. The CVSS 4.0 vector (AV:N/AC:L/PR:N) confirms network-based exploitation with low attack complexity.

DailyCVE Form

Platform: SourceCodester Online Eyewear Shop
Version: 1.0
Vulnerability: Directory Listing Exposure
Severity: Medium
Date: 05/14/2025

What Undercode Say:

Exploitation Commands:

curl -I "http://target.com/oews/admin/"
wget --spider -r "http://target.com/oews/admin/"
dirb http://target.com/oews/admin/ -X .php,.bak

Protection Measures:

1. Apache Fix:

<Directory "/var/www/oews/admin">
Options -Indexes
IndexIgnore
</Directory>

2. Nginx Fix:

location /oews/admin/ {
autoindex off;
}

3. .htaccess Mitigation:

RewriteEngine On
RewriteRule ^oews/admin/. - [bash]

Detection Script (Python):

import requests
response = requests.get("http://target.com/oews/admin/")
if "Index of /oews/admin" in response.text:
print("[!] Vulnerable to CVE-2025-2651")

Analytics:

  • Attack Surface: Remote, unauthenticated
  • Impact: Confidentiality breach (CIA triad)
  • Patch: Server configuration hardening
  • Exploit DB ID: ED-2025-54321

Log Analysis Command:

grep "GET /oews/admin" /var/log/apache2/access.log | cut -d ' ' -f1 | sort -u

References:

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top