CVE-2025-64184

8.8 HIGH

📋 TL;DR

This vulnerability in Dosage comic downloader allows remote attackers to write arbitrary files outside the target directory by manipulating HTTP Content-Type headers. Attackers can exploit this via malicious comic servers or man-in-the-middle attacks when downloading over HTTP. Users of Dosage versions 3.1 and below are affected.

💻 Affected Systems

Products:
  • Dosage comic strip downloader
Versions: 3.1 and below
Operating Systems: All platforms running Dosage
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires downloading comics from untrusted sources or over unencrypted HTTP connections.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via arbitrary file write leading to remote code execution, data theft, or system destruction.

🟠

Likely Case

Local file system corruption, data loss, or privilege escalation through crafted file writes.

🟢

If Mitigated

Limited to denial of service or minor file system issues if proper file permissions and network segmentation are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires attacker to control comic server or intercept HTTP traffic. No authentication needed for basic file write.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2

Vendor Advisory: https://github.com/webcomics/dosage/security/advisories/GHSA-4vcx-3pj3-44m7

Restart Required: No

Instructions:

1. Stop using Dosage. 2. Upgrade to version 3.2 using pip: 'pip install --upgrade dosage==3.2'. 3. Verify installation with 'dosage --version'.

🔧 Temporary Workarounds

Use HTTPS-only comic sources

all

Only download comics from trusted sources over HTTPS to prevent man-in-the-middle attacks.

Run Dosage in restricted environment

linux

Execute Dosage with minimal privileges and in isolated directories using chroot or containers.

docker run --read-only -v /safe/path:/data dosage

🧯 If You Can't Patch

  • Discontinue use of Dosage until patched
  • Only download comics from trusted, verified sources over HTTPS

🔍 How to Verify

Check if Vulnerable:

Check Dosage version with 'dosage --version'. If version is 3.1 or lower, system is vulnerable.

Check Version:

dosage --version

Verify Fix Applied:

After upgrade, run 'dosage --version' and confirm version is 3.2 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file writes outside comic download directory
  • Errors from Dosage about file path validation

Network Indicators:

  • HTTP traffic to comic servers with manipulated Content-Type headers

SIEM Query:

process.name='dosage' AND file.path NOT CONTAINS '/expected/download/directory/'

🔗 References

📤 Share & Export