CVE-2025-49656

7.5 HIGH

📋 TL;DR

This vulnerability allows administrators in Apache Jena Fuseki to create database files outside the designated files area, potentially enabling path traversal attacks. It affects all Apache Jena versions up to 5.4.0. Administrators with file system access could exploit this to write arbitrary files.

💻 Affected Systems

Products:
  • Apache Jena Fuseki
Versions: Up to and including 5.4.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects users with administrator access to the Fuseki server.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator could write malicious files to sensitive system locations, potentially leading to remote code execution, data corruption, or privilege escalation.

🟠

Likely Case

Malicious administrator or compromised admin account could write files to unauthorized directories, potentially disrupting services or exfiltrating data.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized administrators performing legitimate operations.

🌐 Internet-Facing: MEDIUM - If Fuseki is internet-facing, attackers could exploit compromised admin credentials to write files outside designated areas.
🏢 Internal Only: MEDIUM - Internal attackers with admin access could abuse this to write files to unauthorized locations on the server.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials. The vulnerability is a path traversal issue in database file creation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.5.0

Vendor Advisory: https://lists.apache.org/thread/qmm21som8zct813vx6dfd1phnfro6mwq

Restart Required: Yes

Instructions:

1. Download Apache Jena version 5.5.0 or later. 2. Stop the Fuseki server. 3. Replace the existing installation with the new version. 4. Restart the Fuseki server.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit administrator accounts to trusted users only and implement strong authentication controls.

File System Permissions

linux

Configure operating system permissions to restrict the Fuseki process from writing outside designated directories.

chmod -R 750 /path/to/fuseki/files
chown -R fuseki:fuseki /path/to/fuseki/files

🧯 If You Can't Patch

  • Implement strict access controls for administrator accounts and monitor administrator activities closely.
  • Use containerization or virtualization to isolate the Fuseki server and limit file system access.

🔍 How to Verify

Check if Vulnerable:

Check the Apache Jena version. If it's 5.4.0 or earlier, the system is vulnerable if Fuseki is running with administrator access enabled.

Check Version:

java -jar fuseki-server.jar --version

Verify Fix Applied:

Verify the Apache Jena version is 5.5.0 or later and test that database files can only be created within the designated files area.

📡 Detection & Monitoring

Log Indicators:

  • Log entries showing database file creation outside the expected files directory
  • Administrator account performing unusual file operations

Network Indicators:

  • Unusual HTTP requests to Fuseki admin endpoints creating database files

SIEM Query:

source="fuseki.log" AND ("database" OR "file") AND NOT path:"/path/to/expected/files/*"

🔗 References

📤 Share & Export