CVE-2025-65573

8.8 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in AllskyTeam AllSky software allows attackers to trick authenticated users into performing unintended actions, specifically causing denial of service. This affects administrators and users with access to the dashboard interface. The vulnerability exists in the handle_interface_POST_and_status function.

💻 Affected Systems

Products:
  • AllskyTeam AllSky
Versions: v2024.12.06_06 and potentially earlier versions
Operating Systems: Linux-based systems where AllSky is deployed
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with web interface accessible to authenticated users. The vulnerability is in dashboard_LAN.php, dashboard_WLAN.php, and functions.php files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption through DoS, potential configuration changes if other vulnerable endpoints exist, and system instability requiring manual intervention.

🟠

Likely Case

Temporary service interruption affecting dashboard functionality and monitoring capabilities, requiring administrator attention to restore normal operation.

🟢

If Mitigated

No impact if proper CSRF protections are implemented or if the system is not internet-facing with authenticated user access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated user into visiting a malicious page. The vulnerability details are publicly disclosed with code references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Monitor the official AllSky GitHub repository for security updates. 2. Apply any available patches from the vendor. 3. Verify the fix by checking for CSRF token implementation in the affected files.

🔧 Temporary Workarounds

Implement CSRF Protection

linux

Add CSRF tokens to all POST requests in the affected dashboard files

Edit dashboard_LAN.php, dashboard_WLAN.php, and functions.php to include CSRF token validation

Restrict Network Access

all

Limit access to the AllSky web interface to trusted networks only

Configure firewall rules to restrict access to AllSky web port (typically 80/443)

🧯 If You Can't Patch

  • Implement network segmentation to isolate AllSky systems from untrusted networks
  • Use web application firewalls (WAF) with CSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check if your AllSky version is v2024.12.06_06 or earlier by examining the software version in the interface or configuration files.

Check Version:

grep -r 'version' /path/to/allsky/installation/ or check the web interface dashboard

Verify Fix Applied:

Verify that CSRF tokens are implemented in dashboard_LAN.php, dashboard_WLAN.php, and functions.php by checking for token generation and validation code.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to dashboard endpoints without referrer headers
  • Multiple failed status update attempts from same IP

Network Indicators:

  • HTTP requests to dashboard endpoints with suspicious referrers
  • Unusual traffic patterns to AllSky web interface

SIEM Query:

source="allsky.log" AND (url="*dashboard*" AND method="POST") AND NOT referrer="*allsky*"

🔗 References

📤 Share & Export