White Star Software Protop 4.4.2-2024-11-27 - Local File Inclusion (LFI)
White Star Software Protop 4.4.2-2024-11-27 - Local File Inclusion (LFI)
AI Analysis
Technical Summary
The White Star Software Protop version 4.4.2-2024-11-27 is affected by a Local File Inclusion (LFI) vulnerability identified as CVE-2025-44177. This vulnerability stems from improper input validation in the `/pt3upd/` web endpoint, which allows an unauthenticated remote attacker to exploit URL-encoded directory traversal sequences to access arbitrary files on the server's filesystem. The exploit involves sending crafted HTTP GET requests containing encoded traversal patterns such as '..%2f..%2f..%2f..%2fetc%2fpasswd' to retrieve sensitive files like `/etc/passwd`. The vulnerability is classified under CWE-22 (Path Traversal) and was confirmed on a public instance running Ubuntu 22.04. The exploit requires no authentication or user interaction, making it remotely exploitable over the network. The disclosed CVSS v3.1 base score is 8.2, indicating high severity; however, the provided data states no CVSS score is present, so a severity assessment is included below. The vendor was notified promptly and has issued a patch to remediate the issue. Public exploit code is available in plain text, which increases the risk of exploitation by malicious actors. The vulnerability allows attackers to disclose sensitive configuration files and credentials, potentially leading to further compromise such as privilege escalation or lateral movement within affected networks.
Potential Impact
For European organizations using White Star Software Protop 4.4.2, this LFI vulnerability poses a significant risk to confidentiality and integrity. Successful exploitation can lead to unauthorized disclosure of sensitive internal files, including system configuration and credential files, which can be leveraged for further attacks. This can result in data breaches, regulatory non-compliance (notably GDPR violations), reputational damage, and operational disruptions. The unauthenticated and remote nature of the exploit increases the attack surface, allowing attackers to target exposed instances easily. Organizations in sectors with critical infrastructure or sensitive data—such as finance, healthcare, and government—are particularly vulnerable. The vulnerability could also serve as a foothold for advanced persistent threats aiming for privilege escalation or lateral movement within networks. Although no known exploits are currently observed in the wild, the public availability of exploit code heightens the likelihood of imminent exploitation attempts.
Mitigation Recommendations
European organizations should immediately verify if they are running the affected version (4.4.2-2024-11-27) of White Star Software Protop and apply the vendor-provided patch without delay. If immediate patching is not feasible, implement strict Web Application Firewall (WAF) rules to detect and block URL-encoded directory traversal patterns targeting the `/pt3upd/` endpoint. Conduct comprehensive input validation and sanitization on all user-supplied parameters to prevent directory traversal attacks. Restrict access to the vulnerable endpoint to trusted internal networks or via VPN where possible. Enhance monitoring and logging to detect suspicious access patterns indicative of LFI attempts, and establish alerting mechanisms for such events. Regularly audit and harden server file permissions to minimize exposure of sensitive files. Finally, perform penetration testing and vulnerability scanning to confirm remediation and identify any similar vulnerabilities in other endpoints.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
Indicators of Compromise
- exploit-code: # Exploit Title: White Star Software Protop 4.4.2-2024-11-27 - Local File Inclusion (LFI) # Date: 2025-07-09 # Exploit Author: Imraan Khan (Lich-Sec) # Vendor Homepage: https://wss.com/ # Software Link: https://client.protop.co.za/ # Version: v4.4.2-2024-11-27 # Tested on: Ubuntu 22.04 / Linux # CVE: CVE-2025-44177 # CWE: CWE-22 - Path Traversal # Description: # A Local File Inclusion vulnerability exists in White Star Software Protop v4.4.2. # An unauthenticated remote attacker can retrieve arbitrary files via # URL-encoded traversal sequences in the `/pt3upd/` endpoint. # Vulnerable Endpoint: GET /pt3upd/..%2f..%2f..%2f..%2fetc%2fpasswd HTTP/1.1 Host: client.protop.co.za User-Agent: curl/8.0 Accept: */* # Example curl command: curl -i 'https://client.protop.co.za/pt3upd/..%2f..%2f..%2f..%2fetc%2fpasswd' # Notes: # - Vulnerability confirmed on public instance at time of testing. # - CVSS v3.1 Base Score: 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N) # - The vendor was notified and a fix was issued. # Disclosure Timeline: # - Discovered: 2025-03-13 # - Disclosed to vendor: 2025-03-20 # - CVE Assigned: 2025-07-01 # - Public Disclosure: 2025-07-09
White Star Software Protop 4.4.2-2024-11-27 - Local File Inclusion (LFI)
Description
White Star Software Protop 4.4.2-2024-11-27 - Local File Inclusion (LFI)
AI-Powered Analysis
Technical Analysis
The White Star Software Protop version 4.4.2-2024-11-27 is affected by a Local File Inclusion (LFI) vulnerability identified as CVE-2025-44177. This vulnerability stems from improper input validation in the `/pt3upd/` web endpoint, which allows an unauthenticated remote attacker to exploit URL-encoded directory traversal sequences to access arbitrary files on the server's filesystem. The exploit involves sending crafted HTTP GET requests containing encoded traversal patterns such as '..%2f..%2f..%2f..%2fetc%2fpasswd' to retrieve sensitive files like `/etc/passwd`. The vulnerability is classified under CWE-22 (Path Traversal) and was confirmed on a public instance running Ubuntu 22.04. The exploit requires no authentication or user interaction, making it remotely exploitable over the network. The disclosed CVSS v3.1 base score is 8.2, indicating high severity; however, the provided data states no CVSS score is present, so a severity assessment is included below. The vendor was notified promptly and has issued a patch to remediate the issue. Public exploit code is available in plain text, which increases the risk of exploitation by malicious actors. The vulnerability allows attackers to disclose sensitive configuration files and credentials, potentially leading to further compromise such as privilege escalation or lateral movement within affected networks.
Potential Impact
For European organizations using White Star Software Protop 4.4.2, this LFI vulnerability poses a significant risk to confidentiality and integrity. Successful exploitation can lead to unauthorized disclosure of sensitive internal files, including system configuration and credential files, which can be leveraged for further attacks. This can result in data breaches, regulatory non-compliance (notably GDPR violations), reputational damage, and operational disruptions. The unauthenticated and remote nature of the exploit increases the attack surface, allowing attackers to target exposed instances easily. Organizations in sectors with critical infrastructure or sensitive data—such as finance, healthcare, and government—are particularly vulnerable. The vulnerability could also serve as a foothold for advanced persistent threats aiming for privilege escalation or lateral movement within networks. Although no known exploits are currently observed in the wild, the public availability of exploit code heightens the likelihood of imminent exploitation attempts.
Mitigation Recommendations
European organizations should immediately verify if they are running the affected version (4.4.2-2024-11-27) of White Star Software Protop and apply the vendor-provided patch without delay. If immediate patching is not feasible, implement strict Web Application Firewall (WAF) rules to detect and block URL-encoded directory traversal patterns targeting the `/pt3upd/` endpoint. Conduct comprehensive input validation and sanitization on all user-supplied parameters to prevent directory traversal attacks. Restrict access to the vulnerable endpoint to trusted internal networks or via VPN where possible. Enhance monitoring and logging to detect suspicious access patterns indicative of LFI attempts, and establish alerting mechanisms for such events. Regularly audit and harden server file permissions to minimize exposure of sensitive files. Finally, perform penetration testing and vulnerability scanning to confirm remediation and identify any similar vulnerabilities in other endpoints.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Edb Id
- 52367
- Has Exploit Code
- true
- Code Language
- text
Indicators of Compromise
Exploit Source Code
Exploit code for White Star Software Protop 4.4.2-2024-11-27 - Local File Inclusion (LFI)
# Exploit Title: White Star Software Protop 4.4.2-2024-11-27 - Local File Inclusion (LFI) # Date: 2025-07-09 # Exploit Author: Imraan Khan (Lich-Sec) # Vendor Homepage: https://wss.com/ # Software Link: https://client.protop.co.za/ # Version: v4.4.2-2024-11-27 # Tested on: Ubuntu 22.04 / Linux # CVE: CVE-2025-44177 # CWE: CWE-22 - Path Traversal # Description: # A Local File Inclusion vulnerability exists in White Star Software Protop v4.4.2. # An unauthenticated remote attacker can retrieve ar
... (664 more characters)
Threat ID: 687816daa83201eaacdebc79
Added to database: 7/16/2025, 9:17:14 PM
Last enriched: 8/11/2025, 1:21:25 AM
Last updated: 8/18/2025, 1:40:06 AM
Views: 16
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighTop Israeli Cybersecurity Director Arrested in US Child Exploitation Sting
HighEncryptHub abuses Brave Support in new campaign exploiting MSC EvilTwin flaw
MediumU.S. CISA adds N-able N-Central flaws to its Known Exploited Vulnerabilities catalog - Security Affairs
MediumU.S. CISA adds Microsoft Internet Explorer, Microsoft Office Excel, and WinRAR flaws to its Known Exploited Vulnerabilities catalog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.