CVE-2025-55013
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-09

Last updated on: 2025-08-12

Assigner: GitHub, Inc.

Description
The Assemblyline 4 Service Client interfaces with the API to fetch tasks and publish the result for a service in Assemblyline 4. In versions below 4.6.1.dev138, the Assemblyline 4 Service Client (task_handler.py) accepts a SHA-256 value returned by the service server and uses it directly as a local file name.A malicious or compromised server (or any MITM that can speak to client) can return a path-traversal payload such as `../../../etc/cron.d/evil` and force the client to write the downloaded bytes to an arbitrary location on disk. This is fixed in version 4.6.1.dev138.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-09
Last Modified
2025-08-12
Generated
2026-05-07
AI Q&A
2025-08-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cybercentrecanada assemblyline_service_client *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-23 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Assemblyline 4 Service Client versions below 4.6.1.dev138. The client accepts a SHA-256 value from the service server and uses it directly as a local file name. A malicious or compromised server, or a man-in-the-middle attacker, can exploit this by sending a path-traversal payload (e.g., '../../../etc/cron.d/evil'), causing the client to write downloaded data to arbitrary locations on the disk.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to write files to arbitrary locations on the affected system, potentially overwriting critical files or placing malicious files that could be executed. This can lead to high impact on integrity and availability, such as unauthorized code execution or system disruption.


What immediate steps should I take to mitigate this vulnerability?

Upgrade the Assemblyline 4 Service Client to version 4.6.1.dev138 or later, as this version contains the fix for the path traversal vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart