CVE-2025-65952

N/A Unknown

📋 TL;DR

A path traversal vulnerability in Console (a network control system for Gorilla Tag mods) allows attackers to escape the intended directory structure using complex combinations of backslashes and periods. This enables unauthorized file writes to arbitrary directories on the system. Users of Console versions before 2.8.0 are affected.

💻 Affected Systems

Products:
  • Console (Gorilla Tag mod control network)
Versions: All versions prior to 2.8.0
Operating Systems: All platforms running Console
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any installation of Console where users can interact with the file system through the mod control interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary file writes, potentially leading to remote code execution, data destruction, or privilege escalation.

🟠

Likely Case

Unauthorized file modification or creation in sensitive directories, potentially disrupting Gorilla Tag mod functionality or compromising user data.

🟢

If Mitigated

Limited impact with proper file system permissions and restricted user access, though vulnerability still exists.

🌐 Internet-Facing: MEDIUM - Console is network-facing for mod control, but exploitation requires specific access to the Console interface.
🏢 Internal Only: MEDIUM - Internal users with Console access could exploit this to affect other systems or users on the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to Console's mod control interface but uses simple path traversal techniques once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.8.0

Vendor Advisory: https://github.com/iiDk-the-actual/Console/security/advisories/GHSA-c3f7-xh45-2xc7

Restart Required: Yes

Instructions:

1. Download Console version 2.8.0 or later from the official repository. 2. Stop the Console service. 3. Replace existing Console installation with the patched version. 4. Restart the Console service.

🔧 Temporary Workarounds

Restrict file system permissions

all

Limit Console's write permissions to only necessary directories using operating system access controls.

Input validation at proxy

all

Implement input validation for path parameters at network boundary before reaching Console.

🧯 If You Can't Patch

  • Implement strict file system permissions to limit Console's write access to only essential directories
  • Monitor for unusual file system activity from Console processes and implement network segmentation

🔍 How to Verify

Check if Vulnerable:

Check Console version using the version command or configuration file. If version is below 2.8.0, the system is vulnerable.

Check Version:

Check Console configuration or use the Console interface's version command

Verify Fix Applied:

After updating, verify Console version is 2.8.0 or higher and test that path traversal attempts are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations from Console process
  • Path traversal patterns in Console access logs
  • Failed directory escape attempts in logs

Network Indicators:

  • Unusual file transfer patterns from Console network traffic
  • Multiple failed path manipulation attempts

SIEM Query:

Process:Console AND (FileWrite:*\..\* OR FileWrite:*../*)

🔗 References

📤 Share & Export