CVE-2025-60786

8.8 HIGH

📋 TL;DR

A Zip Slip vulnerability in iceScrum v7.54 Pro On-prem allows attackers to execute arbitrary code by uploading a specially crafted Zip file. This affects organizations using the vulnerable version for project management. Attackers can achieve remote code execution on the server.

💻 Affected Systems

Products:
  • iceScrum Pro On-prem
Versions: v7.54
Operating Systems: All platforms running iceScrum
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Pro On-prem edition with the import project feature enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise leading to data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Remote code execution allowing file system access, data exfiltration, and potential ransomware deployment.

🟢

If Mitigated

Limited impact if file uploads are restricted or monitored, though risk remains if vulnerable component is accessible.

🌐 Internet-Facing: HIGH if the import feature is exposed to the internet without authentication or proper controls.
🏢 Internal Only: MEDIUM if accessible only internally, but still poses risk from insider threats or compromised internal accounts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to upload functionality, which typically requires authentication. The vulnerability is well-documented with proof-of-concept available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v7.55 or later

Vendor Advisory: https://www.icescrum.com/download/

Restart Required: Yes

Instructions:

1. Download the latest version from iceScrum website. 2. Backup your current installation. 3. Replace the installation with the patched version. 4. Restart the application server.

🔧 Temporary Workarounds

Disable Project Import Feature

all

Temporarily disable the vulnerable import project functionality.

Modify application configuration to remove import project access

Restrict File Uploads

all

Implement strict file upload validation and monitoring.

Configure web application firewall to block suspicious zip files

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate iceScrum from critical systems.
  • Enable detailed logging and monitoring of all file upload activities and server file system changes.

🔍 How to Verify

Check if Vulnerable:

Check if running iceScrum Pro On-prem version 7.54. Verify if import project feature is accessible.

Check Version:

Check application version in admin interface or application.properties file.

Verify Fix Applied:

Confirm installation of version 7.55 or later. Test import functionality with safe test files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to import endpoints
  • File system writes outside expected directories
  • Suspicious process execution following uploads

Network Indicators:

  • HTTP POST requests to /import endpoints with zip files
  • Unusual outbound connections from iceScrum server

SIEM Query:

source="icescrum" AND (uri_path="/import" OR file_extension=".zip")

🔗 References

📤 Share & Export