Home

Description

eGovFramework/egovframe-common-components versions up to and including 4.3.1 includes Web Editor image upload and related file delivery functionality that uses symmetric encryption to protect URL parameters, but exposes an encryption oracle that allows attackers to generate valid ciphertext for chosen values. The image upload endpoints /utl/wed/insertImage.do and /utl/wed/insertImageCk.do encrypt server-side paths, filenames, and MIME types and embed them directly into a download URL that is returned to the client. Because these same encrypted parameters are trusted by other endpoints, such as /utl/web/imageSrc.do and /cmm/fms/getImage.do, an unauthenticated attacker can abuse the upload functionality to obtain encrypted representations of attacker-chosen identifiers and then replay those ciphertext values to file-serving APIs. This design failure allows an attacker to bypass access controls that rely solely on the secrecy of encrypted parameters and retrieve arbitrary stored files that are otherwise expected to require an existing session or specific authorization context. KISA/KrCERT has identified this unpatched vulnerability as "KVE-2023-5281."

PUBLISHED Reserved 2025-04-15 | Published 2025-11-19 | Updated 2025-11-19 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-345 Insufficient Verification of Data Authenticity

Product status

Default status
unknown

Any version
affected

Credits

Pierre Barre finder

References

www.egovframe.go.kr/eng/sub.do?menuNo=2 product

github.com/eGovFramework/egovframe-common-components product

pierrekim.github.io/...1-20-egovframe-2-vulnerabilities.html technical-description exploit

pierrekim.github.io/advisories/2025-egovframe.txt technical-description exploit

www.vulncheck.com/...e-via-web-editor-image-upload-endpoints third-party-advisory

cve.org (CVE-2025-34337)

nvd.nist.gov (CVE-2025-34337)

Download JSON