The Assemblyline 4 Service Client interfaces with the API to fetch tasks and publish the result for a service in Assemblyline 4. In versions below 4.6.1.dev138, the Assemblyline 4 Service Client (task_handler.py) accepts a SHA-256 value returned by the service server and uses it directly as a local file name.A malicious or compromised server (or any MITM that can speak to client) can return a path-traversal payload such as `../../../etc/cron.d/evil` and force the client to write the downloaded bytes to an arbitrary location on disk. This is fixed in version 4.6.1.dev138.
History

Tue, 12 Aug 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H'}

cvssV3_1

{'score': 4.2, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L'}


Tue, 12 Aug 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Assemblyline Project
Assemblyline Project assemblyline
Vendors & Products Assemblyline Project
Assemblyline Project assemblyline

Mon, 11 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 09 Aug 2025 02:30:00 +0000

Type Values Removed Values Added
Description The Assemblyline 4 Service Client interfaces with the API to fetch tasks and publish the result for a service in Assemblyline 4. In versions below 4.6.1.dev138, the Assemblyline 4 Service Client (task_handler.py) accepts a SHA-256 value returned by the service server and uses it directly as a local file name.A malicious or compromised server (or any MITM that can speak to client) can return a path-traversal payload such as `../../../etc/cron.d/evil` and force the client to write the downloaded bytes to an arbitrary location on disk. This is fixed in version 4.6.1.dev138.
Title Assemblyline 4 Service Client: Arbitrary Write through path traversal in Client code
Weaknesses CWE-23
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-08-12T13:26:26.900Z

Reserved: 2025-08-04T17:34:24.422Z

Link: CVE-2025-55013

cve-icon Vulnrichment

Updated: 2025-08-11T14:07:30.497Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-09T03:15:47.620

Modified: 2025-08-12T14:15:29.400

Link: CVE-2025-55013

cve-icon Redhat

No data.