CVE-2025-47221

5.3 MEDIUM

📋 TL;DR

This vulnerability allows administrators in Keyfactor SignServer to write arbitrary files to any directory accessible by the JBoss user. Attackers with admin credentials can overwrite existing files, potentially leading to system compromise. Only SignServer installations with admin users are affected.

💻 Affected Systems

Products:
  • Keyfactor SignServer
Versions: All versions prior to 7.3.2
Operating Systems: All platforms running SignServer
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin access to exploit. The vulnerability exists in the archive-to-disk configuration properties.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin access could overwrite critical system files, install backdoors, escalate privileges to root, or achieve remote code execution by modifying configuration files.

🟠

Likely Case

Malicious administrators or compromised admin accounts could overwrite application files, modify configurations, or plant persistence mechanisms within the server's file system.

🟢

If Mitigated

With proper access controls and admin account security, the risk is limited to authorized administrators making configuration errors.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials. The vulnerability is straightforward to exploit once admin access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.3.2

Vendor Advisory: https://support.keyfactor.com/hc/en-us/articles/37639116791067-SignServer-CVE-2025-47221-Arbitrary-file-write

Restart Required: Yes

Instructions:

1. Download SignServer 7.3.2 from Keyfactor support portal. 2. Backup current installation and configuration. 3. Stop the SignServer service. 4. Apply the 7.3.2 update following Keyfactor's upgrade documentation. 5. Restart the SignServer service. 6. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrative access to only trusted personnel and implement strong authentication controls.

Monitor Configuration Changes

all

Implement monitoring for changes to ARCHIVETODISK configuration properties.

🧯 If You Can't Patch

  • Implement strict access controls for admin accounts and monitor admin activity
  • Restrict file system permissions for the JBoss user to limit potential damage

🔍 How to Verify

Check if Vulnerable:

Check SignServer version via admin interface or configuration files. If version is below 7.3.2, the system is vulnerable.

Check Version:

Check the SignServer admin web interface or examine the signserver-deploy.properties file for version information.

Verify Fix Applied:

Verify the version is 7.3.2 or higher in the admin interface or configuration. Test that ARCHIVETODISK properties cannot be set to arbitrary paths.

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to ARCHIVETODISK configuration properties
  • Admin account logins from unexpected locations/times
  • File write operations in unexpected directories

Network Indicators:

  • Admin interface access from unauthorized IP addresses

SIEM Query:

source="signserver" AND (event_type="configuration_change" AND config_property="ARCHIVETODISK*") OR (event_type="admin_login" AND result="success")

🔗 References

📤 Share & Export