Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1tbTZ2LTY4cXAtZjlmd84ABDbE
Crayfish allows Remote Code Execution via Homarus Authorization header
Impact
What kind of vulnerability is it? Who is impacted?
Remote code execution may be possible in web-accessible installations of Homarus in certain configurations.
Patches
Has the problem been patched? What versions should users upgrade to?
The issue has been patched in islandora/crayfish:4.1.0
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
The exploit requires making a request against the Homarus's /convert
endpoint; therefore, the ability to exploit is much reduced if the microservice is not directly accessible from the Internet, so: Prevent general access from the Internet from hitting Homarus.
Configure auth in Crayfish to be more strongly required, such that requests with Authorization
headers that do not validate are rejected before the problematic CLI interpolation occurs.
References
Are there any links users can visit to find out more?
- XBOW-024-071
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1tbTZ2LTY4cXAtZjlmd84ABDbE
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: 14 days ago
Updated: 14 days ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-mm6v-68qp-f9fw
References:
- https://github.com/Islandora/Crayfish/security/advisories/GHSA-mm6v-68qp-f9fw
- https://github.com/Islandora/Crayfish/commit/64cb4cec688928798cc40e6f0a0e863d7f69fd89
- https://github.com/advisories/GHSA-mm6v-68qp-f9fw
Blast Radius: 0.0
Affected Packages
packagist:islandora/crayfish
Dependent packages: 1Dependent repositories: 1
Downloads: 487 total
Affected Version Ranges: < 4.1.0
Fixed in: 4.1.0
All affected versions: 0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.0.6, 0.0.7, 0.0.8, 0.0.9, 0.0.10, 0.0.11, 0.0.12, 0.0.13, 0.0.14, 0.0.15, 0.1.0, 0.2.0, 0.2.1, 1.0.0, 1.1.1, 2.0.0, 2.1.0, 3.0.0, 4.0.0
All unaffected versions: 4.1.0