GHSA-c2p2-hgjg-9r3f: Crayfish Allows Remote Code Execution via hypercube X-Islandora-Args Header
N/A
CVSS Score
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
2/12/2025
Updated
2/12/2025
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
islandora/crayfish | composer | <= 4.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability involves RCE through the X-Islandora-Args header, which strongly suggests: 1) A controller handling HTTP requests 2) Direct use of header values in command execution 3) Lack of input sanitization. The HypercubeController
would logically process
hypercube endpoints and arguments. The CWEs indicate injection via improper neutralization, implying raw header values are used in system/exec
calls. While exact code isn't available, the pattern matches common PHP
command injection vulnerabilities where user-controlled headers are passed to shell commands.