GHSA-mm6v-68qp-f9fw

Suggest an improvement
Source
https://github.com/advisories/GHSA-mm6v-68qp-f9fw
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/01/GHSA-mm6v-68qp-f9fw/GHSA-mm6v-68qp-f9fw.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-mm6v-68qp-f9fw
Published
2025-01-15T22:04:19Z
Modified
2025-01-15T22:24:38.707168Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Crayfish allows Remote Code Execution via Homarus Authorization header
Details

Impact

What kind of vulnerability is it? Who is impacted?

Remote code execution may be possible in web-accessible installations of Homarus in certain configurations.

Patches

Has the problem been patched? What versions should users upgrade to?

The issue has been patched in islandora/crayfish:4.1.0

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

The exploit requires making a request against the Homarus's /convert endpoint; therefore, the ability to exploit is much reduced if the microservice is not directly accessible from the Internet, so: Prevent general access from the Internet from hitting Homarus.

Configure auth in Crayfish to be more strongly required, such that requests with Authorization headers that do not validate are rejected before the problematic CLI interpolation occurs.

References

Are there any links users can visit to find out more?

  • XBOW-024-071
Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-150",
        "CWE-157"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2025-01-15T22:04:19Z"
}
References

Affected packages

Packagist / islandora/crayfish

Package

Name
islandora/crayfish
Purl
pkg:composer/islandora/crayfish

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.0

Affected versions

0.*

0.0.1
0.0.2
0.0.3
0.0.4
0.0.5
0.0.6
0.0.7
0.0.8
0.0.9
0.0.10
0.0.11
0.0.12
0.0.13
0.0.14
0.0.15
0.1.0
0.2.0
0.2.1

1.*

1.0.0
1.1.1

2.*

2.0.0
2.1.0

3.*

3.0.0

4.*

4.0.0