Skip to main content

CVE-2025-5029: Path Traversal in Kingdee Cloud Galaxy Private Cloud BBC System

Medium
VulnerabilityCVE-2025-5029cvecve-2025-5029
Published: Wed May 21 2025 (05/21/2025, 14:31:09 UTC)
Source: CVE
Vendor/Project: Kingdee
Product: Cloud Galaxy Private Cloud BBC System

Description

A vulnerability has been found in Kingdee Cloud Galaxy Private Cloud BBC System up to 9.0 Patch April 2025 and classified as critical. Affected by this vulnerability is the function BaseServiceFactory.getFileUploadService.deleteFileAction of the file fileUpload/deleteFileAction.jhtml of the component File Handler. The manipulation of the argument filePath leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.

AI-Powered Analysis

AILast updated: 07/07/2025, 15:25:50 UTC

Technical Analysis

CVE-2025-5029 is a path traversal vulnerability identified in the Kingdee Cloud Galaxy Private Cloud BBC System, specifically affecting versions up to 9.0 Patch April 2025. The vulnerability resides in the file handler component, within the function BaseServiceFactory.getFileUploadService.deleteFileAction, located in the file fileUpload/deleteFileAction.jhtml. The issue arises from improper validation or sanitization of the 'filePath' argument, which an attacker can manipulate to traverse directories outside the intended file system scope. This allows an attacker to potentially access or delete arbitrary files on the server hosting the application. The vulnerability can be exploited remotely without requiring user interaction or elevated privileges, making it accessible to unauthenticated attackers with network access to the service. The disclosed CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no user interaction, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, public disclosure increases the risk of exploitation. The vulnerability's medium severity rating reflects the moderate impact and ease of exploitation, particularly given the partial privileges required (PR:L) and the potential for limited integrity and availability impact through file deletion or unauthorized file access. Organizations using Kingdee Cloud Galaxy Private Cloud BBC System should prioritize patching this vulnerability once a fix is available to prevent unauthorized file system access and potential service disruption.

Potential Impact

For European organizations utilizing Kingdee Cloud Galaxy Private Cloud BBC System, this vulnerability poses a risk of unauthorized file deletion or access, which could lead to disruption of cloud services, data loss, or exposure of sensitive information. Given that the vulnerability allows remote exploitation without user interaction, attackers could automate attacks to compromise systems. The impact on confidentiality is limited but non-negligible, as path traversal could expose configuration files or other sensitive data. Integrity and availability impacts are more pronounced due to the ability to delete files, potentially causing service outages or data integrity issues. Organizations in sectors relying heavily on cloud infrastructure, such as finance, manufacturing, and public services, could face operational disruptions and compliance risks, especially under stringent European data protection regulations like GDPR. The medium severity suggests that while the threat is significant, it may not lead to full system compromise but still requires timely remediation to avoid escalation or chained attacks.

Mitigation Recommendations

1. Apply official patches from Kingdee as soon as they become available to address the vulnerability directly. 2. Implement strict input validation and sanitization on all file path parameters to prevent traversal sequences (e.g., '..', '%2e%2e') from being processed. 3. Employ web application firewalls (WAFs) with rules specifically designed to detect and block path traversal attempts targeting the affected endpoints. 4. Restrict file system permissions for the application process to the minimum necessary, ensuring it cannot access or delete files outside designated directories. 5. Monitor logs for unusual file deletion or access patterns, especially requests to the deleteFileAction endpoint with suspicious filePath parameters. 6. Conduct regular security assessments and penetration testing focusing on file handling functionalities to detect similar vulnerabilities proactively. 7. Segment network access to the Kingdee Cloud Galaxy Private Cloud BBC System, limiting exposure to trusted networks and reducing the attack surface. 8. Educate system administrators and security teams about this vulnerability to ensure rapid detection and response to any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-21T10:04:46.963Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682de546c4522896dcbfff82

Added to database: 5/21/2025, 2:37:58 PM

Last enriched: 7/7/2025, 3:25:50 PM

Last updated: 8/12/2025, 4:50:59 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats