CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
The Terrapack software, from ASTER TEC / ASTER S.p.A., with the indicated components and versions has a file upload vulnerability that may allow attackers to execute arbitrary code. Vulnerable components include Terrapack TkWebCoreNG:: 1.0.20200914, Terrapack TKServerCGI 2.5.4.150, and Terrapack TpkWebGIS Client 1.0.0.
Analysis
A file upload vulnerability exists in multiple Terrapack software components from ASTER TEC / ASTER S.p.A. that permits remote code execution when attackers upload malicious files. The affected products include Terrapack TkWebCoreNG version 1.0.20200914, Terrapack TKServerCGI version 2.5.4.150, and Terrapack TpkWebGIS Client version 1.0.0. Proof-of-concept code is available in public repositories, and the vulnerability enables arbitrary code execution on affected systems.
Technical Context
The vulnerability is rooted in improper file upload handling within web-facing components of the Terrapack software suite, specifically in the TkWebCoreNG web framework and TKServerCGI server implementations. The weakness falls under the general category of unrestricted file uploads with insufficient validation, allowing attackers to bypass file type restrictions and upload executable code. The affected technology stack involves web application server components designed for geographic information system (GIS) operations. While specific CWE classification is not provided in the vulnerability record, this type of flaw typically maps to CWE-434 (Unrestricted Upload of File with Dangerous Type). The CPE data available indicates generic product identification (cpe:2.3:a:n/a:n/a), suggesting incomplete vendor CPE registration, which complicates automated vulnerability matching and patch tracking.
Affected Products
Terrapack TkWebCoreNG version 1.0.20200914 is affected, as is Terrapack TKServerCGI version 2.5.4.150, and Terrapack TpkWebGIS Client version 1.0.0. No explicit upper bound on affected versions is documented in the CVE record. The vendor is ASTER TEC / ASTER S.p.A. Formal CPE strings are not precisely specified beyond the generic placeholder (cpe:2.3:a:n/a:n/a:*:*:*:*:*:*:*:*), indicating vendor CPE registration deficiencies. Organizations using Terrapack GIS software should assume all indicated component versions are vulnerable. References include the vendor domain http://aster.com and http://terrapack.com; however, no official vendor security advisory URL is documented in the NVD references.
Remediation
Contact ASTER TEC / ASTER S.p.A. directly via http://aster.com or http://terrapack.com to obtain patched versions of Terrapack TkWebCoreNG, TKServerCGI, and TpkWebGIS Client. The vendor has not published explicit patch versions or advisory URLs in the NVD record, requiring vendor communication to obtain fixes. Pending vendor patches, implement network-layer mitigations: restrict web server access to trusted IP ranges and trusted clients only; disable file upload functionality if not required; deploy a web application firewall (WAF) to block suspicious file uploads and enforce strict file type whitelisting at the application and filesystem level; monitor file upload directories for execution attempts; and isolate affected systems on network segments with minimal lateral movement paths. For critical deployments, consider replacing Terrapack with actively maintained GIS software alternatives until patches are confirmed available. Italian CSIRT (https://www.acn.gov.it/portale/en/csirt-italia) may provide additional coordination or vendor contact information.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-208903