CVE-2025-44177 Scanner
CVE-2025-44177 Scanner - Directory Traversal vulnerability in White Star Software ProTop
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
17 days 13 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
White Star Software ProTop is a monitoring software used by enterprises to oversee the performance and operations of Progress OpenEdge databases. It is developed by White Star Software and is widely utilized by database administrators to ensure database health and performance metrics. The software can be deployed across various environments to provide real-time data analytics and trends. Its functionalities include alert management, detailed charting, and process monitoring for database systems. It is designed to aid in quick decision-making with its comprehensive dashboard insights. Thus, ProTop plays an essential role in managing and ensuring the reliability and performance of mission-critical database systems.
A directory traversal vulnerability in White Star Software ProTop poses risk by allowing unauthorized access to files on the server file system. This vulnerability, identified as CVE-2025-44177, particularly affects the version 4.4.2-2024-11-27. An attacker can exploit this vulnerability using specially crafted URLs to read sensitive files on the server. This sort of vulnerability arises due to improper validation of user input related to file paths. The severity of the flaw is significant as it allows access to potentially sensitive data which could compromise system integrity. The threat level is exacerbated by the fact that it doesn't require authentication to exploit.
The directory traversal vulnerability in White Star Software ProTop is technically found at the /pt3upd/ endpoint. By encoding traversal sequences within the URL, an attacker can exploit this vulnerability to access and read arbitrary files. Specifically, the sequences "..%2f..%2f..%2f..%2fetc%2fpasswd" within a GET request can disclose the contents of key system files. The system fails to sanitize these traversal sequences correctly thus, permitting the exploitation. The request header must include 'application/octet-stream' and 'filename="passwd"' indicating access to sensitive files. The server returns a 200 status indicating successful retrieval of the target file.
Possible effects of exploiting the directory traversal vulnerability in ProTop include unauthorized access to sensitive system files which can lead to information disclosure. Attackers may leverage this access to gather critical data about the system and users, including configuration and password files. Such access could further enable other attacks, such as privilege escalation or system compromise, due to the exposure of system architecture and credential information. It undermines the confidentiality of the information asset by exposing sensitive directories and files. Mitigation of this vulnerability is crucial to safeguard sensitive data and maintain system integrity.
REFERENCES