We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-8516

Kingdee Cloud-Starry-Sky Enterprise Edition IIS-K3CloudMiniApp FileUploadAction.class path traversal



Description

EN DE

A vulnerability was found in Kingdee Cloud-Starry-Sky Enterprise Edition up to 8.2. It has been classified as problematic. Affected is the function BaseServiceFactory.getFileUploadService.deleteFileAction of the file K3Cloud\BBCMallSite\WEB-INF\lib\Kingdee.K3.O2O.Base.WebApp.jar!\kingdee\k3\o2o\base\webapp\action\FileUploadAction.class of the component IIS-K3CloudMiniApp. The manipulation of the argument filePath leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor recommends as a short-term measure to "[t]emporarily disable external network access to the Kingdee Cloud Galaxy Retail System or set up an IP whitelist for access control." The long-term remediation will be: "Install the security patch provided by the Starry Sky system, with the specific solutions being: i) Adding authentication to the vulnerable CMKAppWebHandler.ashx interface; ii) Removing the file reading function."

Es wurde eine problematische Schwachstelle in Kingdee Cloud-Starry-Sky Enterprise Edition bis 8.2 ausgemacht. Es geht dabei um die Funktion BaseServiceFactory.getFileUploadService.deleteFileAction der Datei K3Cloud\BBCMallSite\WEB-INF\lib\Kingdee.K3.O2O.Base.WebApp.jar!\kingdee\k3\o2o\base\webapp\action\FileUploadAction.class der Komponente IIS-K3CloudMiniApp. Mittels dem Manipulieren des Arguments filePath mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.

Reserved 2025-08-04 | Published 2025-08-04 | Updated 2025-08-04 | Assigner VulDB


MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:C
MEDIUM: 5.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:C
5.0AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:W/RC:C

Problem types

Path Traversal

Product status

8.0
affected

8.1
affected

8.2
affected

Timeline

2025-08-04:Advisory disclosed
2025-08-04:VulDB entry created
2025-08-04:VulDB entry last update

Credits

caichaoxiong (VulDB User) reporter

References

vuldb.com/?id.318642 (VDB-318642 | Kingdee Cloud-Starry-Sky Enterprise Edition IIS-K3CloudMiniApp FileUploadAction.class path traversal) vdb-entry technical-description

vuldb.com/?ctiid.318642 (VDB-318642 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.573678 (Submit #573678 | Kingdee Kingdee Cloud-Starry-Sky Enterprise Edition V8.2 Directory Traversal and Arbitrary File Reading Vulnerability) third-party-advisory

wx.mail.qq.com/s?k=hk3Fixc6Z1cKMI9rge exploit

cve.org (CVE-2025-8516)

nvd.nist.gov (CVE-2025-8516)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-8516

Support options

Helpdesk Chat, Email, Knowledgebase