CVE-2025-52480

9.8 CRITICAL

📋 TL;DR

CVE-2025-52480 is an argument injection vulnerability in Registrator.jl's gettreesha() function that allows remote code execution when processing malicious GitHub clone URLs. This affects all users running Registrator versions prior to 1.9.5. The vulnerability has a CVSS score of 9.8, indicating critical severity.

💻 Affected Systems

Products:
  • Registrator.jl
Versions: All versions prior to 1.9.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any deployment where Registrator processes GitHub clone URLs, which is its core functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary code with the privileges of the Registrator process, potentially leading to data theft, system takeover, or lateral movement.

🟠

Likely Case

Attackers exploiting this vulnerability to execute commands on the Registrator server, potentially compromising the Julia package registry or using the system as a foothold for further attacks.

🟢

If Mitigated

Limited impact if Registrator runs in a highly restricted container with minimal permissions and network access, though RCE would still be possible within the container.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires a malicious or compromised GitHub repository URL to be processed by Registrator, which could occur through various attack vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.5

Vendor Advisory: https://github.com/JuliaRegistries/Registrator.jl/security/advisories/GHSA-w8jv-rg3h-fc68

Restart Required: Yes

Instructions:

1. Stop Registrator service. 2. Update Registrator to version 1.9.5 using your package manager or by downloading from GitHub. 3. Restart Registrator service.

🧯 If You Can't Patch

  • Isolate Registrator in a container with minimal privileges and network access
  • Implement strict input validation for GitHub URLs before they reach Registrator

🔍 How to Verify

Check if Vulnerable:

Check Registrator version - if it's below 1.9.5, it's vulnerable

Check Version:

Check the Registrator configuration or deployment manifest for version information

Verify Fix Applied:

Verify version is 1.9.5 or higher and check that the patch from PR #449 is applied

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in Registrator logs
  • Processing of suspicious GitHub URLs with special characters
  • Error messages related to argument parsing failures

Network Indicators:

  • Unusual outbound connections from Registrator server
  • Requests to unexpected external resources

SIEM Query:

source="registrator" AND ("argument" OR "injection" OR "unexpected command")

🔗 References

📤 Share & Export