CVE-2025-54305
BaseFortify
Publication date: 2025-12-04
Last updated on: 2025-12-16
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| thermofisher | torrent_suite_software | 5.18.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-290 | This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Thermo Fisher Torrent Suite Django application 5.18.1. The LocalhostAuthMiddleware middleware authenticates any user as 'ionadmin' if the request's REMOTE_ADDR is set to localhost addresses (127.0.0.1, 127.0.1.1, or ::1). This means that any user with local access to the server can bypass normal authentication controls and gain elevated privileges.
How can this vulnerability impact me? :
If an attacker or unauthorized user has local access to the server, they can exploit this vulnerability to bypass authentication and gain administrative access as 'ionadmin'. This could lead to unauthorized access to sensitive data, modification of application settings, or other malicious activities within the application environment.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, restrict local access to the server to trusted users only, as any user with local access can bypass authentication via the LocalhostAuthMiddleware. Additionally, consider disabling or modifying the LocalhostAuthMiddleware to prevent automatic authentication based solely on REMOTE_ADDR values of 127.0.0.1, 127.0.1.1, or ::1.