Skip to main content

CVE-2025-34039: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Yonyou Co., Ltd. UFIDA NC

Critical
VulnerabilityCVE-2025-34039cvecve-2025-34039cwe-78cwe-306
Published: Tue Jun 24 2025 (06/24/2025, 01:07:05 UTC)
Source: CVE Database V5
Vendor/Project: Yonyou Co., Ltd.
Product: UFIDA NC

Description

A code injection vulnerability exists in Yonyou UFIDA NC v6.5 and prior due to the exposure of the BeanShell testing servlet (bsh.servlet.BshServlet) without proper access controls. The servlet allows unauthenticated remote attackers to execute arbitrary Java code via the bsh.script parameter. This can be exploited to run system commands and ultimately gain full control over the target server. The issue is rooted in a third-party JAR component bundled with the application, and the servlet is accessible without authentication on vulnerable installations.

AI-Powered Analysis

AILast updated: 06/24/2025, 02:10:33 UTC

Technical Analysis

CVE-2025-34039 is a critical remote code execution vulnerability affecting Yonyou Co., Ltd.'s UFIDA NC product, version 6.5 and prior. The root cause is the exposure of the BeanShell testing servlet (bsh.servlet.BshServlet), which is included as part of a third-party JAR component bundled with the application. This servlet is accessible without any authentication or access control, allowing unauthenticated remote attackers to submit arbitrary Java code via the bsh.script parameter. Because BeanShell scripts can execute system commands, attackers can leverage this to perform OS command injection, leading to full system compromise. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command) and CWE-306 (Missing Authentication for Critical Function). The CVSS 4.0 score is 10.0 (critical), reflecting the ease of exploitation (network accessible, no authentication or user interaction required) and the high impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the severity and simplicity of exploitation make this a highly urgent issue. The vulnerability affects installations where the BeanShell servlet remains exposed, which is often the case in default or improperly secured deployments of UFIDA NC v6.5 and earlier. Attackers can remotely execute arbitrary commands, potentially leading to data theft, service disruption, or use of the compromised server as a pivot point for further attacks within an organization’s network.

Potential Impact

For European organizations using UFIDA NC, this vulnerability poses a severe risk. UFIDA NC is an enterprise resource planning (ERP) system widely used by large enterprises and government entities, particularly in sectors like manufacturing, finance, and public administration. Exploitation could lead to unauthorized access to sensitive business data, disruption of critical business processes, and potential regulatory non-compliance due to data breaches. The ability to execute arbitrary code remotely without authentication means attackers can deploy ransomware, steal intellectual property, or establish persistent footholds within corporate networks. Given the critical nature of ERP systems in business operations, successful exploitation could cause significant operational downtime and financial losses. Additionally, compromised servers could be leveraged to launch attacks on supply chains or partners, amplifying the impact. The lack of known exploits in the wild does not diminish the urgency, as the vulnerability’s characteristics make it a prime target for attackers once public awareness increases.

Mitigation Recommendations

1. Immediate removal or disabling of the BeanShell testing servlet (bsh.servlet.BshServlet) from all UFIDA NC installations, especially in production environments. 2. If removal is not immediately feasible, restrict access to the servlet via network-level controls such as firewall rules or VPN-only access. 3. Apply strict authentication and authorization controls to any exposed management or testing interfaces. 4. Monitor network traffic and logs for suspicious requests targeting the bsh.servlet.BshServlet or unusual command execution patterns. 5. Conduct a thorough audit of all UFIDA NC instances to identify and remediate exposed servlets or other unnecessary services. 6. Engage with Yonyou Co., Ltd. for official patches or updates addressing this vulnerability and prioritize their deployment. 7. Implement application-layer web application firewalls (WAFs) with custom rules to detect and block attempts to exploit the bsh.script parameter. 8. Educate IT and security teams about this specific threat to ensure rapid detection and response. 9. Consider network segmentation to isolate critical ERP systems from less secure network zones to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.546Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685a0560dec26fc862d8cf6c

Added to database: 6/24/2025, 1:54:40 AM

Last enriched: 6/24/2025, 2:10:33 AM

Last updated: 8/13/2025, 12:50:08 AM

Views: 30

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats