logo

CVE-2025-25286 islandora/crayfish

Package

Manager: composer
Name: islandora/crayfish
Vulnerable Version: >=0 <4.1.0

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00418 pctl0.60984

Details

Crayfish allows Remote Code Execution via Homarus Authorization header ### Impact Remote code execution may be possible in web-accessible installations of Homarus in certain configurations. ### Patches The issue has been patched in `islandora/crayfish:4.1.0` ### Workarounds The exploit requires making a request against the Homarus's `/convert` endpoint; therefore, the ability to exploit is much reduced if the microservice is not directly accessible from the Internet, so: Prevent general access from the Internet from hitting Homarus. Configure auth in Crayfish to be more strongly required, such that requests with `Authorization` headers that do not validate are rejected before the problematic CLI interpolation occurs. ### References - XBOW-024-071

Metadata

Created: 2025-01-15T22:04:19Z
Modified: 2025-02-13T16:49:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/01/GHSA-mm6v-68qp-f9fw/GHSA-mm6v-68qp-f9fw.json
CWE IDs: ["CWE-150", "CWE-157"]
Alternative ID: GHSA-mm6v-68qp-f9fw
Finding: F111
Auto approve: 1