CVE-2025-11146

5.4 MEDIUM

📋 TL;DR

CVE-2025-11146 is a reflected cross-site scripting vulnerability in Apt-Cacher-NG's web management interface that allows attackers to inject malicious scripts via manipulated URLs. When exploited, this can lead to session hijacking, credential theft, or unauthorized administrative actions. Organizations running Apt-Cacher-NG web management interfaces accessible to untrusted users are affected.

💻 Affected Systems

Products:
  • Apt-Cacher-NG
Versions: v3.2.1 and possibly earlier versions
Operating Systems: Linux distributions using Apt-Cacher-NG
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with web management interface enabled and accessible. The vulnerability is in the /acng-report.html endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains administrative control of Apt-Cacher-NG, modifies package repositories to distribute malware, steals administrator credentials, and pivots to internal network systems.

🟠

Likely Case

Attacker steals session cookies or credentials from administrators who click malicious links, leading to unauthorized access to the caching proxy management interface.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the Apt-Cacher-NG management interface only, preventing lateral movement.

🌐 Internet-Facing: HIGH if web management interface is exposed to internet, as reflected XSS requires no authentication and can be delivered via phishing.
🏢 Internal Only: MEDIUM if only accessible internally, as attackers would need internal network access or successful phishing against internal users.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires user interaction (clicking malicious link). No authentication required to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for patched version

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-apt-cacher-ng

Restart Required: Yes

Instructions:

1. Check vendor advisory for patched version. 2. Update Apt-Cacher-NG to patched version. 3. Restart Apt-Cacher-NG service. 4. Verify fix by testing /acng-report.html endpoint.

🔧 Temporary Workarounds

Disable web management interface

Linux

Disable the web management interface if not required for operations

Edit Apt-Cacher-NG configuration to disable AdminAuth and ReportPage
Restart service: systemctl restart apt-cacher-ng

Network access restrictions

Linux

Restrict access to Apt-Cacher-NG web interface to trusted IPs only

Configure firewall rules: iptables -A INPUT -p tcp --dport 3142 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 3142 -j DROP

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers to mitigate XSS impact
  • Deploy web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Test /acng-report.html endpoint with XSS payload in URL parameters: http://server:3142/acng-report.html?test=<script>alert('XSS')</script>

Check Version:

apt-cacher-ng --version or check package manager: dpkg -l apt-cacher-ng

Verify Fix Applied:

After patching, repeat XSS test - script should not execute and input should be properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual long URLs with script tags in access logs
  • Multiple requests to /acng-report.html with encoded characters

Network Indicators:

  • HTTP requests containing <script> tags in URL parameters
  • Unusual referrer headers pointing to /acng-report.html

SIEM Query:

source="apt-cacher-ng" AND url="*acng-report.html*" AND (url="*%3Cscript%3E*" OR url="*<script>*")

🔗 References

📤 Share & Export