Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-24028 | Assemblyline 4 service client vulnerable to Arbitrary Write through path traversal in Client code |
Github GHSA |
GHSA-75jv-vfxf-3865 | Assemblyline 4 service client vulnerable to Arbitrary Write through path traversal in Client code |
Tue, 12 Aug 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 12 Aug 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Assemblyline Project
Assemblyline Project assemblyline |
|
| Vendors & Products |
Assemblyline Project
Assemblyline Project assemblyline |
Mon, 11 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 09 Aug 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Assemblyline 4 Service Client interfaces with the API to fetch tasks and publish the result for a service in Assemblyline 4. In versions below 4.6.1.dev138, the Assemblyline 4 Service Client (task_handler.py) accepts a SHA-256 value returned by the service server and uses it directly as a local file name.A malicious or compromised server (or any MITM that can speak to client) can return a path-traversal payload such as `../../../etc/cron.d/evil` and force the client to write the downloaded bytes to an arbitrary location on disk. This is fixed in version 4.6.1.dev138. | |
| Title | Assemblyline 4 Service Client: Arbitrary Write through path traversal in Client code | |
| Weaknesses | CWE-23 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-12T13:26:26.900Z
Reserved: 2025-08-04T17:34:24.422Z
Link: CVE-2025-55013
Updated: 2025-08-11T14:07:30.497Z
Status : Deferred
Published: 2025-08-09T03:15:47.620
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-55013
No data.
OpenCVE Enrichment
Updated: 2025-08-12T11:47:16Z
EUVD
Github GHSA