CVE-2025-66480

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical path traversal vulnerability in Wildfire IM's file upload functionality that allows attackers to write arbitrary files anywhere the application has write permissions. Attackers can achieve remote code execution by uploading malicious files like scripts or overwriting critical system files. All systems running Wildfire IM versions prior to 1.4.3 are affected.

💻 Affected Systems

Products:
  • Wildfire IM Server
Versions: All versions prior to 1.4.3
Operating Systems: All operating systems where Wildfire IM runs
Default Config Vulnerable: ⚠️ Yes
Notes: Any deployment with the vulnerable im-server component and file upload functionality enabled is affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise with remote code execution, data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to server takeover, data exfiltration, and deployment of ransomware or cryptominers.

🟢

If Mitigated

Limited impact if proper file system permissions restrict application write access to non-critical directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP file upload capability with directory traversal sequences in filenames.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.3

Vendor Advisory: https://github.com/wildfirechat/im-server/security/advisories/GHSA-74hq-jhx2-fq6c

Restart Required: Yes

Instructions:

1. Download Wildfire IM version 1.4.3 or later from official repository. 2. Stop the im-server service. 3. Replace the vulnerable files with patched version. 4. Restart the im-server service. 5. Verify the fix by testing file upload functionality.

🔧 Temporary Workarounds

Disable file upload endpoint

linux

Temporarily disable the /fs endpoint in application configuration or firewall rules

# In firewall: iptables -A INPUT -p tcp --dport [app_port] -m string --string '/fs' --algo bm -j DROP

Restrict application write permissions

linux

Configure the application to run with minimal file system write permissions

# Create dedicated user: sudo useradd -r -s /bin/false wildfire
# Change ownership: sudo chown -R wildfire:wildfire /opt/wildfire
# Run service as restricted user

🧯 If You Can't Patch

  • Implement strict WAF rules to block requests containing directory traversal sequences (../, ..\, etc.) in filenames
  • Deploy file integrity monitoring to detect unauthorized file writes to sensitive system locations

🔍 How to Verify

Check if Vulnerable:

Check if version is below 1.4.3 and test file upload with filename containing directory traversal sequences like '../../test.txt'

Check Version:

Check application logs or configuration files for version information, or run: java -jar im-server.jar --version if applicable

Verify Fix Applied:

After patching, attempt file upload with malicious filenames and verify they are rejected or sanitized

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /fs endpoint with filenames containing '../' sequences
  • File write operations outside expected upload directories
  • Unusual process execution from upload directories

Network Indicators:

  • HTTP requests with multipart/form-data containing suspicious filenames
  • Unusual outbound connections from server after file uploads

SIEM Query:

source="wildfire_logs" AND (uri_path="/fs" AND filename="*../*") OR (event_type="file_write" AND file_path!="/expected/upload/dir/*")

🔗 References

📤 Share & Export