CVE-2025-54292

4.6 MEDIUM

📋 TL;DR

This path traversal vulnerability in Canonical LXD LXD-UI allows authenticated attackers to access or modify resources outside intended directories by manipulating URL paths. It affects all platforms running LXD-UI versions before 6.5 and 5.21.4. Only authenticated users can exploit this vulnerability.

💻 Affected Systems

Products:
  • Canonical LXD LXD-UI
Versions: All versions before 6.5 and before 5.21.4
Operating Systems: All platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to LXD-UI interface

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attackers could read sensitive system files, modify configuration, or access other container data leading to privilege escalation or data exfiltration.

🟠

Likely Case

Authenticated users accessing unintended container resources or configuration files they shouldn't have access to.

🟢

If Mitigated

Limited impact with proper authentication controls and network segmentation in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of resource naming patterns

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5 or 5.21.4

Vendor Advisory: https://github.com/canonical/lxd/security/advisories/GHSA-7425-4qpj-v4w3

Restart Required: Yes

Instructions:

1. Update LXD-UI to version 6.5 or 5.21.4
2. Restart LXD service
3. Verify the update was successful

🔧 Temporary Workarounds

Restrict LXD-UI Access

all

Limit network access to LXD-UI interface to trusted networks only

Configure firewall rules to restrict access to LXD-UI port (default 8443)

Implement Strong Authentication

all

Enforce strong authentication policies and limit user privileges

Review and tighten LXD user permissions and authentication methods

🧯 If You Can't Patch

  • Implement network segmentation to isolate LXD-UI from sensitive systems
  • Enable detailed logging and monitoring for suspicious path traversal attempts

🔍 How to Verify

Check if Vulnerable:

Check LXD-UI version with: lxc version | grep -i ui

Check Version:

lxc version | grep -i ui

Verify Fix Applied:

Confirm version is 6.5 or higher, or 5.21.4 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual path patterns in LXD-UI access logs
  • Multiple failed path traversal attempts
  • Access to unexpected resource names

Network Indicators:

  • Unusual patterns of requests to LXD-UI with crafted paths
  • Multiple requests with ../ patterns

SIEM Query:

source="lxd-ui" AND (path="*../*" OR path="*..\\*" OR resource="*unusual*pattern*")

🔗 References

📤 Share & Export