CVE-2025-53632

9.1 CRITICAL

📋 TL;DR

CVE-2025-53632 is a path traversal vulnerability (zip slip) in Chall-Manager that allows unauthenticated attackers to write arbitrary files outside the intended extraction directory when processing scenario zip archives. This affects all Chall-Manager deployments prior to v0.1.4. While the software is typically deployed internally, any exposed instance is vulnerable.

💻 Affected Systems

Products:
  • Chall-Manager
Versions: All versions before v0.1.4
Operating Systems: All platforms (platform-agnostic)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration when processing scenario zip files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution, complete system compromise, or data destruction via arbitrary file writes to sensitive locations like /etc/passwd, startup scripts, or web directories.

🟠

Likely Case

File system manipulation leading to service disruption, data corruption, or limited code execution depending on file write locations and permissions.

🟢

If Mitigated

Limited impact if properly isolated in internal network with strict firewall rules preventing external access.

🌐 Internet-Facing: HIGH - Unauthenticated exploit with CVSS 9.1 score; any internet-facing instance is trivially exploitable.
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or compromised internal systems, but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward - craft malicious zip archive with path traversal filenames. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.1.4

Vendor Advisory: https://github.com/ctfer-io/chall-manager/security/advisories/GHSA-3gv2-v3jx-r9fh

Restart Required: Yes

Instructions:

1. Stop Chall-Manager service. 2. Update to v0.1.4 via package manager or manual download. 3. Restart Chall-Manager service. 4. Verify fix by checking version.

🔧 Temporary Workarounds

Network Isolation

linux

Restrict network access to Chall-Manager using firewall rules

iptables -A INPUT -p tcp --dport [CHALL-MANAGER-PORT] -s [TRUSTED-NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [CHALL-MANAGER-PORT] -j DROP

Disable Scenario Upload

all

Temporarily disable scenario upload/processing functionality

Edit configuration to disable zip processing or remove upload endpoints

🧯 If You Can't Patch

  • Isolate Chall-Manager behind strict firewall allowing only trusted IPs
  • Implement network segmentation to prevent lateral movement if compromised

🔍 How to Verify

Check if Vulnerable:

Check Chall-Manager version; if < v0.1.4, vulnerable. Test by attempting to upload zip with '../' in filenames.

Check Version:

Check Chall-Manager logs or configuration for version string, or run: chall-manager --version

Verify Fix Applied:

After patching, test with same malicious zip; should reject or sanitize path traversal attempts.

📡 Detection & Monitoring

Log Indicators:

  • Failed or successful file writes with path traversal patterns (../)
  • Unusual zip file processing errors
  • File writes outside expected directories

Network Indicators:

  • Unusual spikes in zip file uploads to Chall-Manager
  • Requests with zip files from unexpected sources

SIEM Query:

source="chall-manager" AND ("../" OR "..\\" OR "zip" AND "write")

🔗 References

📤 Share & Export