FKIE_CVE-2025-54769

Vulnerability from fkie_nvd - Published: 2025-07-29 00:15 - Updated: 2025-11-03 20:19
Summary
An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.
Impacted products
Vendor Product Version
xorux lpar2rrd *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xorux:lpar2rrd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B49D9F5-0510-4191-B286-427ECC02C837",
              "versionEndIncluding": "8.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing.  This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker."
    },
    {
      "lang": "es",
      "value": "Un usuario autenticado de solo lectura puede cargar un archivo y realizar un directory traversal  para colocarlo en la ubicaci\u00f3n que elija. Esto puede usarse para sobrescribir m\u00f3dulos PERL existentes en la aplicaci\u00f3n y lograr la ejecuci\u00f3n remota de c\u00f3digo (RCE) por parte de un atacante."
    }
  ],
  "id": "CVE-2025-54769",
  "lastModified": "2025-11-03T20:19:15.053",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-07-29T00:15:24.473",
  "references": [
    {
      "source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://korelogic.com/Resources/Advisories/KL-001-2025-016.txt"
    },
    {
      "source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
      "tags": [
        "Release Notes"
      ],
      "url": "https://lpar2rrd.com/note800.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2025/Jul/19"
    }
  ],
  "sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-24"
        },
        {
          "lang": "en",
          "value": "CWE-434"
        },
        {
          "lang": "en",
          "value": "CWE-648"
        }
      ],
      "source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…