mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
68 lines
3.4 KiB
JSON
68 lines
3.4 KiB
JSON
{
|
|
"id": "CVE-2025-25286",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2025-02-13T01:15:25.280",
|
|
"lastModified": "2025-02-13T01:15:25.280",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Crayfish is a collection of Islandora 8 microservices, one of which, Homarus, provides FFmpeg as a microservice. Prior to Crayfish version 4.1.0, remote code execution may be possible in web-accessible installations of Homarus in certain configurations. The issue has been patched in `islandora/crayfish:4.1.0`. Some workarounds are available. The exploit requires making a request against the Homarus's `/convert` endpoint; therefore, the ability to exploit is much reduced if the microservice is not directly accessible from the Internet, so: Prevent general access from the Internet from hitting Homarus. Alternatively or additionally, configure auth in Crayfish to be more strongly required, such that requests with `Authorization` headers that do not validate are rejected before the problematic CLI interpolation occurs."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Crayfish es una colecci\u00f3n de microservicios de Islandora 8, uno de los cuales, Homarus, proporciona FFmpeg como microservicio. Antes de la versi\u00f3n 4.1.0 de Crayfish, la ejecuci\u00f3n remota de c\u00f3digo pod\u00eda ser posible en instalaciones de Homarus accesibles desde la web en ciertas configuraciones. El problema se ha corregido en `islandora/crayfish:4.1.0`. Hay algunos workarounds disponibles. El exploit requiere realizar una solicitud contra el endpoint `/convert` de Homarus; por lo tanto, la capacidad de explotar se reduce mucho si el microservicio no es directamente accesible desde Internet, por lo tanto: Evite que el acceso general desde Internet llegue a Homarus. Como alternativa o adicionalmente, configure la autenticaci\u00f3n en Crayfish para que sea m\u00e1s obligatoria, de modo que las solicitudes con encabezados `Authorization` que no validen se rechacen antes de que se produzca la interpolaci\u00f3n de CLI problem\u00e1tica."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-150"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-157"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/Islandora/Crayfish/commit/64cb4cec688928798cc40e6f0a0e863d7f69fd89",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/Islandora/Crayfish/security/advisories/GHSA-mm6v-68qp-f9fw",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |