CVE-2025-55013

4.2 MEDIUM

📋 TL;DR

This vulnerability allows a malicious or compromised Assemblyline 4 server (or any MITM attacker) to write arbitrary files to any location on the client's filesystem by providing path-traversal payloads in SHA-256 values. It affects all Assemblyline 4 Service Client installations below version 4.6.1.dev138 that communicate with untrusted or potentially compromised servers.

💻 Affected Systems

Products:
  • Assemblyline 4 Service Client
Versions: All versions below 4.6.1.dev138
Operating Systems: All operating systems running Assemblyline 4 Service Client
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires client to communicate with a malicious or compromised server. Default configurations are vulnerable if server trust is broken.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could write malicious files to critical system locations (e.g., /etc/cron.d, startup scripts, SSH keys) leading to complete system compromise, persistence, or data destruction.

🟠

Likely Case

A compromised Assemblyline server could deploy malware or backdoors to client systems, potentially spreading through the analysis infrastructure.

🟢

If Mitigated

With proper network segmentation and server authentication, impact is limited to the specific client service account's permissions.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires either a compromised Assemblyline server or MITM position between client and server. The vulnerability is in how the client processes server responses.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.6.1.dev138 and above

Vendor Advisory: https://github.com/CybercentreCanada/assemblyline/security/advisories/GHSA-75jv-vfxf-3865

Restart Required: No

Instructions:

1. Update Assemblyline 4 Service Client to version 4.6.1.dev138 or higher. 2. Verify the fix by checking the commit 351414e7e96cc1f5640ae71ae51b939e8ba30900 is present. 3. No service restart required for the fix to take effect.

🔧 Temporary Workarounds

Network Segmentation and Server Authentication

all

Restrict client communication to trusted Assemblyline servers only using network controls and strong server authentication.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Assemblyline clients from untrusted networks
  • Use application allowlisting to prevent execution of unauthorized files written to unexpected locations

🔍 How to Verify

Check if Vulnerable:

Check if Assemblyline 4 Service Client version is below 4.6.1.dev138. Review task_handler.py for direct use of SHA-256 values as file paths without sanitization.

Check Version:

Check the Assemblyline service client version in your deployment configuration or run: python -c "import assemblyline_service_client; print(assemblyline_service_client.__version__)"

Verify Fix Applied:

Verify the installation includes commit 351414e7e96cc1f5640ae71ae51b939e8ba30900 which adds path sanitization in task_handler.py.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file writes outside expected Assemblyline directories
  • File operations with path traversal patterns (../) in file paths

Network Indicators:

  • Unusual network traffic patterns between Assemblyline clients and servers
  • MITM detection alerts between client-server communication

SIEM Query:

source="assemblyline" AND (file_path="*../*" OR file_operation="write" AND file_path NOT STARTS WITH "/expected/assemblyline/path/")

🔗 References

📤 Share & Export