CVE-2025-67728

9.8 CRITICAL

📋 TL;DR

CVE-2025-67728 is a command injection vulnerability in Fireshare that allows authenticated users (or unauthenticated users if Public Uploads is enabled) to execute arbitrary system commands by uploading files with malicious filenames. This can lead to remote code execution, file uploads to arbitrary directories via path traversal, and complete system compromise. All Fireshare instances running version 1.2.30 or below are affected.

💻 Affected Systems

Products:
  • Fireshare
Versions: 1.2.30 and below
Operating Systems: All platforms where Fireshare runs
Default Config Vulnerable: ⚠️ Yes
Notes: Unauthenticated exploitation requires Public Uploads setting to be enabled. Authenticated exploitation works regardless of this setting.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining root/system-level access, installing persistent backdoors, exfiltrating sensitive data, and pivoting to other systems.

🟠

Likely Case

Attacker uploads web shells, executes arbitrary commands to steal credentials or data, and establishes persistence on the compromised server.

🟢

If Mitigated

Limited impact with proper network segmentation, minimal privileges, and monitoring catching exploitation attempts before significant damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires minimal technical skill. Public PoC available in GitHub advisory. Weaponization likely due to low complexity and high impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.0

Vendor Advisory: https://github.com/ShaneIsrael/fireshare/security/advisories/GHSA-c4f5-g622-q72m

Restart Required: Yes

Instructions:

1. Backup your Fireshare data and configuration. 2. Update to version 1.3.0 or later using your deployment method (Docker, manual install, etc.). 3. Restart the Fireshare service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable Public Uploads

all

Prevents unauthenticated exploitation by disabling the Public Uploads feature

Set 'publicUploads' to false in Fireshare configuration

Restrict Upload Directory Permissions

linux

Limit damage by restricting write permissions on upload directories

chmod 755 /path/to/fireshare/uploads
chown www-data:www-data /path/to/fireshare/uploads

🧯 If You Can't Patch

  • Disable Public Uploads feature immediately
  • Implement strict WAF rules to block filenames containing shell metacharacters and path traversal sequences

🔍 How to Verify

Check if Vulnerable:

Check Fireshare version. If version is 1.2.30 or below, system is vulnerable.

Check Version:

Check Fireshare web interface settings or run: docker exec fireshare_container cat /app/package.json | grep version

Verify Fix Applied:

Verify Fireshare version is 1.3.0 or higher. Test upload functionality with safe filenames to ensure it works.

📡 Detection & Monitoring

Log Indicators:

  • Unusual filenames containing shell metacharacters (;, &, |, $, `)
  • Multiple failed upload attempts with suspicious filenames
  • Commands executed from Fireshare process with unusual arguments

Network Indicators:

  • HTTP POST requests to upload endpoints with filenames containing shell metacharacters
  • Outbound connections from Fireshare server to unknown IPs

SIEM Query:

source="fireshare.log" AND (filename="*;*" OR filename="*&*" OR filename="*|*" OR filename="*`*" OR filename="*$*" OR filename="*..*" OR filename="*/../*")

🔗 References

📤 Share & Export