Miggo Logo

GHSA-c2p2-hgjg-9r3f: Crayfish Allows Remote Code Execution via hypercube X-Islandora-Args Header

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
2/12/2025
Updated
2/12/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
islandora/crayfishcomposer<= 4.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability involves RCE through the X-Islandora-Args header, which strongly suggests: 1) A controller handling HTTP requests 2) Direct use of header values in command execution 3) Lack of input sanitization. The HypercubeController would logically process hypercube endpoints and arguments. The CWEs indicate injection via improper neutralization, implying raw header values are used in system/exec calls. While exact code isn't available, the pattern matches common PHP command injection vulnerabilities where user-controlled headers are passed to shell commands.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t _W**t kin* o* vuln*r**ility is it? W*o is imp**t**?_ R*mot* *o** *x**ution is possi*l* in w**-****ssi*l* inst*ll*tions o* *yp*r*u**. ### P*t***s _**s t** pro*l*m ***n p*t****? W**t v*rsions s*oul* us*rs up*r*** to?_ Not y*t, t*ou** no

Reasoning

T** vuln*r**ility involv*s R** t*rou** t** X-Isl*n*or*-*r*s *****r, w*i** stron*ly su***sts: *) * *ontroll*r **n*lin* *TTP r*qu*sts *) *ir**t us* o* *****r v*lu*s in *omm*n* *x**ution *) L**k o* input s*nitiz*tion. T** `*yp*r*u***ontroll*r` woul* lo*