CVE-2025-47244

7.3 HIGH

📋 TL;DR

This vulnerability in Inedo ProGet allows remote attackers to access restricted functionality through the C# reflection layer, potentially causing denial of service or information disclosure. It affects ProGet installations through version 2024.22, particularly when anonymous access is enabled or when CSRF attacks succeed.

💻 Affected Systems

Products:
  • Inedo ProGet
Versions: through 2024.22
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Anonymous access increases vulnerability; CSRF attacks can bypass authentication requirements.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system disruption through denial of service (restart loops) and exposure of sensitive configuration data or credentials.

🟠

Likely Case

Service disruption through targeted restart attacks and potential information leakage about system configuration.

🟢

If Mitigated

Limited impact if anonymous access is disabled and CSRF protections are properly implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Demonstrated exploitation available in disclosure; anonymous access enables unauthenticated attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.23 or later

Vendor Advisory: https://docs.inedo.com/docs/proget/installation/installation-guide

Restart Required: Yes

Instructions:

1. Download latest ProGet installer from my.inedo.com. 2. Run installer to upgrade. 3. Restart ProGet service.

🔧 Temporary Workarounds

Disable Anonymous Access

all

Prevents unauthenticated exploitation by requiring authentication for all access.

Navigate to ProGet Admin > Security > Anonymous Access > Disable

Implement CSRF Protections

all

Add anti-CSRF tokens to prevent cross-site request forgery attacks.

Configure web.config or application settings with CSRF protection

🧯 If You Can't Patch

  • Disable anonymous access immediately
  • Implement network segmentation to restrict access to ProGet instances
  • Monitor for unusual restart patterns or reflection API calls

🔍 How to Verify

Check if Vulnerable:

Check ProGet version in Admin > About; if version is 2024.22 or earlier, system is vulnerable.

Check Version:

Check web interface at /about or examine installation directory version files

Verify Fix Applied:

Verify version is 2024.23 or later in Admin > About after patching.

📡 Detection & Monitoring

Log Indicators:

  • Unusual frequency of RestartWeb calls
  • Reflection API access from unexpected sources
  • Anonymous user accessing restricted endpoints

Network Indicators:

  • HTTP requests to reflection endpoints from unauthenticated sources
  • CSRF-style request patterns

SIEM Query:

source="proget" AND (event="RestartWeb" OR event="ReflectionAccess") AND user="anonymous"

🔗 References

📤 Share & Export