fkie_cve-2025-25286
Vulnerability from fkie_nvd
Published
2025-02-13 01:15
Modified
2025-02-13 01:15
Severity ?
Summary
Crayfish is a collection of Islandora 8 microservices, one of which, Homarus, provides FFmpeg as a microservice. Prior to Crayfish version 4.1.0, remote code execution may be possible in web-accessible installations of Homarus in certain configurations. The issue has been patched in `islandora/crayfish:4.1.0`. Some workarounds are available. The exploit requires making a request against the Homarus's `/convert` endpoint; therefore, the ability to exploit is much reduced if the microservice is not directly accessible from the Internet, so: Prevent general access from the Internet from hitting Homarus. Alternatively or additionally, configure auth in Crayfish to be more strongly required, such that requests with `Authorization` headers that do not validate are rejected before the problematic CLI interpolation occurs.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "Crayfish is a collection of Islandora 8 microservices, one of which, Homarus, provides FFmpeg as a microservice. Prior to Crayfish version 4.1.0, remote code execution may be possible in web-accessible installations of Homarus in certain configurations. The issue has been patched in `islandora/crayfish:4.1.0`. Some workarounds are available. The exploit requires making a request against the Homarus\u0027s `/convert` endpoint; therefore, the ability to exploit is much reduced if the microservice is not directly accessible from the Internet, so: Prevent general access from the Internet from hitting Homarus. Alternatively or additionally, configure auth in Crayfish to be more strongly required, such that requests with `Authorization` headers that do not validate are rejected before the problematic CLI interpolation occurs." }, { "lang": "es", "value": "Crayfish es una colecci\u00f3n de microservicios de Islandora 8, uno de los cuales, Homarus, proporciona FFmpeg como microservicio. Antes de la versi\u00f3n 4.1.0 de Crayfish, la ejecuci\u00f3n remota de c\u00f3digo pod\u00eda ser posible en instalaciones de Homarus accesibles desde la web en ciertas configuraciones. El problema se ha corregido en `islandora/crayfish:4.1.0`. Hay algunos workarounds disponibles. El exploit requiere realizar una solicitud contra el endpoint `/convert` de Homarus; por lo tanto, la capacidad de explotar se reduce mucho si el microservicio no es directamente accesible desde Internet, por lo tanto: Evite que el acceso general desde Internet llegue a Homarus. Como alternativa o adicionalmente, configure la autenticaci\u00f3n en Crayfish para que sea m\u00e1s obligatoria, de modo que las solicitudes con encabezados `Authorization` que no validen se rechacen antes de que se produzca la interpolaci\u00f3n de CLI problem\u00e1tica." } ], "id": "CVE-2025-25286", "lastModified": "2025-02-13T01:15:25.280", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2025-02-13T01:15:25.280", "references": [ { "source": "security-advisories@github.com", "url": "https://github.com/Islandora/Crayfish/commit/64cb4cec688928798cc40e6f0a0e863d7f69fd89" }, { "source": "security-advisories@github.com", "url": "https://github.com/Islandora/Crayfish/security/advisories/GHSA-mm6v-68qp-f9fw" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-150" }, { "lang": "en", "value": "CWE-157" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…