CVE-2025-54769

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated read-only users to upload files and perform directory traversal attacks, enabling them to overwrite existing PERL modules within the application. This can lead to remote code execution (RCE) by attackers. Systems running affected versions of the software with authenticated user access are at risk.

💻 Affected Systems

Products:
  • LPAR2RRD
Versions: Versions prior to 8.00
Operating Systems: Linux, AIX, Other Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated read-only user access; default installations with authentication enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through remote code execution, allowing attackers to execute arbitrary commands, steal data, install malware, or pivot to other systems.

🟠

Likely Case

Attackers gain persistent access to the system, install backdoors, exfiltrate sensitive data, or disrupt application functionality.

🟢

If Mitigated

Unauthorized file uploads are blocked, preventing directory traversal and limiting impact to denial of service if uploads are still possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details and proof-of-concept are publicly available in security advisories; requires authenticated access but minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 8.00

Vendor Advisory: https://lpar2rrd.com/note800.php

Restart Required: Yes

Instructions:

1. Download LPAR2RRD version 8.00 from the official website. 2. Stop the LPAR2RRD service. 3. Backup current installation and data. 4. Install the new version following vendor instructions. 5. Restart the service.

🔧 Temporary Workarounds

Restrict File Upload Permissions

linux

Modify application or system permissions to prevent file uploads by read-only users.

chmod 644 /path/to/upload/directory/*
chown root:root /path/to/upload/directory

Disable Read-Only User Uploads

all

Configure the application to disable file upload functionality for read-only users.

🧯 If You Can't Patch

  • Implement strict access controls to limit authenticated user access to trusted sources only.
  • Deploy web application firewall (WAF) rules to block directory traversal patterns and suspicious file uploads.

🔍 How to Verify

Check if Vulnerable:

Check if LPAR2RRD version is below 8.00 and if authenticated users can upload files.

Check Version:

grep 'version' /path/to/lpar2rrd/installation/*.pl 2>/dev/null | head -1

Verify Fix Applied:

Verify installation of version 8.00 and test that authenticated read-only users cannot upload files or perform directory traversal.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload attempts by authenticated users
  • Directory traversal patterns in file paths
  • Modifications to PERL module files in unexpected locations

Network Indicators:

  • HTTP POST requests with file uploads to vulnerable endpoints
  • Traffic spikes to upload functionality

SIEM Query:

source="application_logs" AND (event="file_upload" AND user_role="read-only") OR (path CONTAINS "../")

🔗 References

📤 Share & Export