GHSA-c2p2-hgjg-9r3f

Suggest an improvement
Source
https://github.com/advisories/GHSA-c2p2-hgjg-9r3f
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-c2p2-hgjg-9r3f/GHSA-c2p2-hgjg-9r3f.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-c2p2-hgjg-9r3f
Published
2025-02-12T21:05:47Z
Modified
2025-02-12T21:25:37.518936Z
Severity
  • 9.5 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H CVSS Calculator
Summary
Crayfish Allows Remote Code Execution via hypercube X-Islandora-Args Header
Details

Impact

What kind of vulnerability is it? Who is impacted?

Remote code execution is possible in web-accessible installations of hypercube.

Patches

Has the problem been patched? What versions should users upgrade to?

Not yet, though no patch is neccessary if your installation of the microservices is behind a firewall. See below.

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

The exploit requires making a request against Hypercube's endpoints; therefore, the ability to make use of the exploit is much reduced if the microservice is not directly accessible from the Internet, so: Prevent general access from the Internet from hitting Hypercube. Furthermore, if you've used any of the official installation methods, your Crayfish will be behind a firewall and there is no work neccessary.

The webserver might be made to validate the structure of headers passed, but that would only be neccessary if you publicly exposed the endpoint. Standard security practices should be applied.

References

Are there any links users can visit to find out more?

  • XBOW-024-074
Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-150",
        "CWE-74"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2025-02-12T21:05:47Z"
}
References

Affected packages

Packagist / islandora/crayfish

Package

Name
islandora/crayfish
Purl
pkg:composer/islandora/crayfish

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
4.0.0

Affected versions

0.*

0.0.1
0.0.2
0.0.3
0.0.4
0.0.5
0.0.6
0.0.7
0.0.8
0.0.9
0.0.10
0.0.11
0.0.12
0.0.13
0.0.14
0.0.15
0.1.0
0.2.0
0.2.1

1.*

1.0.0
1.1.1

2.*

2.0.0
2.1.0

3.*

3.0.0

4.*

4.0.0