CVE-2025-25286

Crayfish is a collection of Islandora 8 microservices, one of which, Homarus, provides FFmpeg as a microservice. Prior to Crayfish version 4.1.0, remote code execution may be possible in web-accessible installations of Homarus in certain configurations. The issue has been patched in `islandora/crayfish:4.1.0`. Some workarounds are available. The exploit requires making a request against the Homarus's `/convert` endpoint; therefore, the ability to exploit is much reduced if the microservice is not directly accessible from the Internet, so: Prevent general access from the Internet from hitting Homarus. Alternatively or additionally, configure auth in Crayfish to be more strongly required, such that requests with `Authorization` headers that do not validate are rejected before the problematic CLI interpolation occurs.
Configurations

No configuration.

History

13 Feb 2025, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-13 01:15

Updated : 2025-02-13 01:15


NVD link : CVE-2025-25286

Mitre link : CVE-2025-25286

CVE.ORG link : CVE-2025-25286


JSON object : View

Products Affected

No product.

CWE
CWE-150

Improper Neutralization of Escape, Meta, or Control Sequences

CWE-157

Failure to Sanitize Paired Delimiters