CVE-2025-55013
Description
The Assemblyline 4 Service Client interfaces with the API to fetch tasks and publish the result for a service in Assemblyline 4. In versions below 4.6.1.dev138, the Assemblyline 4 Service Client (task_handler.py) accepts a SHA-256 value returned by the service server and uses it directly as a local file name.A malicious or compromised server (or any MITM that can speak to client) can return a path-traversal payload such as ../../../etc/cron.d/evil and force the client to write the downloaded bytes to an arbitrary location on disk. This is fixed in version 4.6.1.dev138.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
assemblyline-service-clientPyPI | < 4.6.0.stable11 | 4.6.0.stable11 |
assemblyline-service-clientPyPI | >= 4.6.1.dev0, < 4.6.1.dev138 | 4.6.1.dev138 |
Patches
1351414e7e96cMerge pull request #81 from CybercentreCanada/GHSA-75jv-vfxf-3865
1 file changed · +9 −1
assemblyline_service_client/task_handler.py+9 −1 modified@@ -12,11 +12,13 @@ import requests import yaml +from assemblyline_core.server_base import ServerBase + from assemblyline.common.digests import get_sha256_for_file from assemblyline.common.str_utils import StringTable +from assemblyline.odm import SHA256_REGEX from assemblyline.odm.messages.task import Task as ServiceTask from assemblyline.odm.models.service import Service -from assemblyline_core.server_base import ServerBase STATUSES = StringTable('STATUSES', [ ('INITIALIZING', 0), @@ -365,6 +367,12 @@ def get_task(self) -> ServiceTask: return task def download_file(self, sha256, sid) -> Optional[str]: + if not SHA256_REGEX.match(sha256): + # If the SHA256 is not valid, we cannot download the file + self.log.error(f"[{sid}] Invalid SHA256 provided: {sha256}") + self.status = STATUSES.ERROR_FOUND + return None + self.status = STATUSES.DOWNLOADING_FILE received_file_sha256 = '' file_path = None
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4- github.com/advisories/GHSA-75jv-vfxf-3865ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-55013ghsaADVISORY
- github.com/CybercentreCanada/assemblyline-service-client/commit/351414e7e96cc1f5640ae71ae51b939e8ba30900nvdWEB
- github.com/CybercentreCanada/assemblyline/security/advisories/GHSA-75jv-vfxf-3865nvdWEB
News mentions
0No linked articles in our index yet.