CVE-2025-61506

9.8 CRITICAL

📋 TL;DR

MediaCrush versions through 1.0.1 contain an unrestricted file upload vulnerability that allows unauthenticated attackers to upload arbitrary files of any size. This affects all MediaCrush instances with the vulnerable /upload endpoint exposed, potentially leading to server compromise.

💻 Affected Systems

Products:
  • MediaCrush
Versions: through 1.0.1
Operating Systems: all
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations with the /upload endpoint accessible are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover via remote code execution by uploading malicious files like webshells, leading to data theft, ransomware deployment, or use as attack infrastructure.

🟠

Likely Case

Denial of service through disk space exhaustion from large file uploads, or web shell deployment for persistent access and data exfiltration.

🟢

If Mitigated

Limited impact if file uploads are restricted to authenticated users with proper file type validation and size limits.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST requests to /upload endpoint with malicious files can exploit this vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: unknown

Vendor Advisory: unknown

Restart Required: No

Instructions:

No official patch available. Consider workarounds or discontinuing use of MediaCrush.

🔧 Temporary Workarounds

Implement file upload restrictions

all

Add authentication to /upload endpoint and implement file type validation and size limits.

# Modify MediaCrush configuration to require authentication for uploads
# Implement file validation in upload handler

Web Application Firewall rules

all

Block or restrict access to /upload endpoint using WAF rules.

# Example nginx rule: location /upload { deny all; }
# Example Apache rule: <Location /upload> Require all denied </Location>

🧯 If You Can't Patch

  • Disable or block access to the /upload endpoint entirely
  • Implement network segmentation to isolate MediaCrush instances

🔍 How to Verify

Check if Vulnerable:

Test if unauthenticated file uploads to /upload endpoint are accepted without size or type restrictions.

Check Version:

Check MediaCrush version in configuration files or application metadata.

Verify Fix Applied:

Verify that uploads now require authentication and have proper file validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusually large file uploads
  • Multiple failed upload attempts
  • Uploads of suspicious file types (e.g., .php, .exe)

Network Indicators:

  • HTTP POST requests to /upload endpoint from unauthenticated sources
  • Large upload traffic spikes

SIEM Query:

source="web_logs" AND (uri_path="/upload" AND http_method="POST") AND user_agent NOT IN allowed_user_agents

🔗 References

📤 Share & Export