CVE-2025-66384

8.2 HIGH

📋 TL;DR

CVE-2025-66384 is a vulnerability in MISP (Malware Information Sharing Platform) that allows attackers to bypass file upload validation checks. This could enable malicious file uploads or potentially lead to remote code execution. All MISP instances running versions before 2.5.24 are affected.

💻 Affected Systems

Products:
  • MISP (Malware Information Sharing Platform)
Versions: All versions before 2.5.24
Operating Systems: Linux, Unix-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the EventsController.php component responsible for handling file uploads in MISP.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, or lateral movement within the network.

🟠

Likely Case

Malicious file uploads that could serve as initial access vectors, potentially leading to malware deployment or data manipulation.

🟢

If Mitigated

Limited impact with proper file upload restrictions, web application firewalls, and network segmentation in place.

🌐 Internet-Facing: HIGH - MISP instances exposed to the internet are directly vulnerable to exploitation attempts.
🏢 Internal Only: MEDIUM - Internal-only instances are still vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of MISP's file upload logic and the specific validation bypass. The commit shows changes to tmp_name validation logic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.5.24

Vendor Advisory: https://github.com/MISP/MISP/releases/tag/v2.5.24

Restart Required: Yes

Instructions:

1. Backup your MISP instance and database. 2. Update MISP to version 2.5.24 using git: 'git pull origin 2.5.24'. 3. Run the update script: 'sudo -u www-data /var/www/MISP/app/Console/cake Admin update'. 4. Restart your web server (Apache/Nginx). 5. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable file uploads

linux

Temporarily disable file upload functionality in MISP until patching is possible

Modify MISP configuration to restrict file upload permissions

Web Application Firewall rules

all

Implement WAF rules to block suspicious file upload patterns

🧯 If You Can't Patch

  • Implement strict file upload restrictions and validation at the web server level
  • Isolate MISP instance behind additional network segmentation and access controls

🔍 How to Verify

Check if Vulnerable:

Check MISP version via web interface or command line: 'grep -i version /var/www/MISP/VERSION.json'

Check Version:

cat /var/www/MISP/VERSION.json | grep version

Verify Fix Applied:

Verify version is 2.5.24 or later and check that the EventsController.php file contains the fix from commit 6867f0d

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload patterns
  • Failed file validation attempts
  • Large number of file upload requests

Network Indicators:

  • Suspicious file uploads to MISP endpoints
  • Unusual outbound connections from MISP server

SIEM Query:

source="misp_logs" AND (event="file_upload" OR event="validation_failure") AND status="success"

🔗 References

📤 Share & Export