CVE-2025-23012
📋 TL;DR
Fedora Repository 3.8.x includes a service account (fedoraIntCallUser) with default credentials that can be exploited to read local files by manipulating datastreams. This affects all systems running Fedora Repository 3.8.x, which was released in 2015 and is no longer maintained. Organizations using this outdated version are vulnerable to unauthorized file access.
💻 Affected Systems
- Fedora Repository
📦 What is this software?
Fcrepo by Fedorarepository
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full read access to sensitive files on the server, potentially exposing credentials, configuration files, or other confidential data.
Likely Case
Unauthorized users read arbitrary files from the server filesystem, leading to information disclosure and potential credential harvesting.
If Mitigated
With proper access controls and monitoring, impact is limited to attempted access that can be detected and blocked.
🎯 Exploit Status
Exploitation requires knowledge of the default credentials and understanding of datastream manipulation techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Migrate to Fedora Repository 6.5.1 or later
Vendor Advisory: https://github.com/fcrepo/fcrepo/releases
Restart Required: No
Instructions:
1. Backup all repository data and configurations. 2. Follow migration guide at https://github.com/fcrepo-exts/migration-utils. 3. Deploy Fedora Repository 6.5.1 or newer. 4. Test functionality before production deployment.
🔧 Temporary Workarounds
Change fedoraIntCallUser credentials
allChange the default password for the fedoraIntCallUser service account to prevent credential-based attacks.
Update password in fedora-users.xml configuration file
Restrict datastream manipulation permissions
allModify XACML policies to limit what the fedoraIntCallUser account can do with datastreams.
Edit XACML policies as documented at https://wiki.lyrasis.org/display/FEDORA38/XACML+Policy+Enforcement
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Fedora Repository systems
- Enable detailed logging and monitoring for all fedoraIntCallUser account activities
🔍 How to Verify
Check if Vulnerable:
Check if running Fedora Repository version 3.8.x by examining version files or configuration.
Check Version:
Check fedora version in configuration files or via repository API endpoints
Verify Fix Applied:
Confirm migration to Fedora Repository 6.5.1 or later and verify fedoraIntCallUser account has proper restrictions.
📡 Detection & Monitoring
Log Indicators:
- Unusual datastream manipulation activities
- Multiple failed login attempts for fedoraIntCallUser
- File read operations from unexpected sources
Network Indicators:
- Unusual API calls to datastream endpoints
- Traffic patterns suggesting file enumeration
SIEM Query:
source="fedora-repo" AND (user="fedoraIntCallUser" OR operation="datastream")
🔗 References
- https://github.com/fcrepo-exts/migration-utils
- https://github.com/fcrepo/fcrepo/releases
- https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-021-01.json
- https://wiki.lyrasis.org/display/FEDORA38/XACML+Policy+Enforcement#XACMLPolicyEnforcement-4.1fedora-usersattributes