CVE-2025-1980 PUBLISHED

Remote Code Execution via Unrestricted File Upload in Ready_

Assigner: CERT-PL
Reserved: 05.03.2025 Published: 16.04.2025 Updated: 16.04.2025

The Ready_ application's Profile section allows users to upload files of any type and extension without restriction. If the server is misconfigured, as it was by default when installed at the turn of 2021 and 2022, it can result in Remote Code Execution. Refer to the Required Configuration for Exposure section for more information.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 7.1
CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 9.4

MISCONFIGURED

Product Status

Vendor Symfonia
Product Ready_
Versions Default: unaffected
  • affected from 7.0.0.0 to 7.19.39.23 (incl.)
  • affected from 8.0.0.0 to 8.0.2.3 (incl.)

Affected Configurations

Impacted instances are those whose PHP files stored in public_html/apps/edokumenty/var can be executed. This can be simply checked using the following temporary PHP file: <? echo 'test';

If you see 'test' after navigating to that file in the browser, it means that this instance is misconfigured and allows for the execution of uploaded files.

Credits

  • Maksymilian Kubiak, Sławomir Zakrzewski, Jakub Stankiewicz - Afine Team finder

References

Problem Types

  • CWE-434 Unrestricted Upload of File with Dangerous Type CWE