CVE-2025-62724

4.3 MEDIUM

📋 TL;DR

Open OnDemand HPC portal versions before 4.0.8 and 3.1.16 contain a TOCTOU vulnerability in zip file downloads that could allow authenticated users to bypass file allowlist restrictions. This affects sites using file browser allowlists, though accessed files remain protected by UNIX permissions. The vulnerability requires user interaction and specific conditions to exploit.

💻 Affected Systems

Products:
  • Open OnDemand
Versions: All versions before 4.0.8 and 3.1.16
Operating Systems: Linux/Unix systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects sites using file browser allowlists (OOD_ALLOWLIST). Files accessed are still protected by UNIX permissions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated users could access sensitive files outside the allowlist that their UNIX permissions permit, potentially exposing configuration files, logs, or other restricted data.

🟠

Likely Case

Limited information disclosure of files that users already have some UNIX permissions to access, but which are intentionally excluded from the OOD_ALLOWLIST.

🟢

If Mitigated

No impact if proper UNIX permissions are configured, as the vulnerability only bypasses the application-level allowlist, not OS-level file permissions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated user access and specific timing conditions (TOCTOU).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.8 or 3.1.16

Vendor Advisory: https://github.com/OSC/ondemand/security/advisories/GHSA-vjpg-34px-gjrw

Restart Required: Yes

Instructions:

1. Identify your Open OnDemand version. 2. Upgrade to version 4.0.8 if using v4.x, or 3.1.16 if using v3.x. 3. Restart the Open OnDemand service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable file downloads

linux

Temporarily disable zip file download functionality in Open OnDemand configuration

# Edit Open OnDemand configuration to disable file downloads

Restrict user permissions

linux

Tighten UNIX file permissions on sensitive directories to limit potential exposure

chmod 750 /sensitive/directories
chown root:root /sensitive/directories

🧯 If You Can't Patch

  • Implement strict UNIX file permissions to limit what users can access even if they bypass the allowlist
  • Monitor for unusual file access patterns and implement additional access controls

🔍 How to Verify

Check if Vulnerable:

Check Open OnDemand version. If version is below 4.0.8 (for v4.x) or below 3.1.16 (for v3.x), the system is vulnerable.

Check Version:

ood --version  # or check Open OnDemand web interface version

Verify Fix Applied:

Verify Open OnDemand version is 4.0.8 or higher (for v4.x) or 3.1.16 or higher (for v3.x). Test zip file downloads to ensure they respect allowlist restrictions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns via Open OnDemand file browser
  • Multiple failed/successful attempts to download files outside normal patterns

Network Indicators:

  • Increased file download activity from single users
  • Unusual timing patterns in file requests

SIEM Query:

source="openondemand" AND (event="file_download" OR event="zip_extract") AND file_path NOT IN allowed_paths

🔗 References

📤 Share & Export