2025-03-02 03:03:52 +00:00

98 lines
5.4 KiB
JSON

{
"id": "CVE-2025-22605",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-24T15:15:12.330",
"lastModified": "2025-01-24T15:15:12.330",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Starting in version 4.0.0-beta.18 and prior to 4.0.0-beta.253, a vulnerability in the execution of commands on remote servers allows an authenticated user to execute arbitrary code on the local Coolify container, gaining access to data and private keys or tokens of other users/teams. The ability to inject malicious commands into the Coolify container gives authenticated attackers the ability to fully retrieve and control the data and availability of the software. Centrally hosted Coolify instances (open registration and/or multiple teams with potentially untrustworthy users) are especially at risk, as sensitive data of all users and connected servers can be leaked by any user. Additionally, attackers are able to modify the running software, potentially deploying malicious images to remote nodes or generally changing its behavior. Version 4.0.0-beta.253 patches this issue."
},
{
"lang": "es",
"value": "Coolify es una herramienta de c\u00f3digo abierto y autoalojable para administrar servidores, aplicaciones y bases de datos. A partir de la versi\u00f3n 4.0.0-beta.18 y anteriores a la 4.0.0-beta.253, una vulnerabilidad en la ejecuci\u00f3n de comandos en servidores remotos permite a un usuario autenticado ejecutar c\u00f3digo arbitrario en el contenedor local de Coolify, obteniendo acceso a datos y claves privadas o tokens de otros usuarios/equipos. La capacidad de inyectar comandos maliciosos en el contenedor de Coolify brinda a los atacantes autenticados la capacidad de recuperar y controlar completamente los datos y la disponibilidad del software. Las instancias de Coolify alojadas de forma centralizada (registro abierto y/o varios equipos con usuarios potencialmente no confiables) corren un riesgo especial, ya que cualquier usuario puede filtrar datos confidenciales de todos los usuarios y servidores conectados. Adem\u00e1s, los atacantes pueden modificar el software en ejecuci\u00f3n, lo que podr\u00eda implementar im\u00e1genes maliciosas en nodos remotos o, en general, cambiar su comportamiento. La versi\u00f3n 4.0.0-beta.253 corrige este problema."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/coollabsio/coolify/blob/40a239ddda3fc919f57a052d7b52b8e1a6696b81/bootstrap/helpers/remoteProcess.php#L70",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/coollabsio/coolify/commit/353245bb7de9680f238bae30443af1696bc977b0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/coollabsio/coolify/pull/1524",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/coollabsio/coolify/pull/1625",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/coollabsio/coolify/security/advisories/GHSA-9wqm-fg79-4748",
"source": "security-advisories@github.com"
}
]
}