CVE-2025-64726

HIGH
中文标题:
(暂无数据)
英文标题:
External Control of System or Configuration Setting and Uncontrolled Search Path Element in sfw
CVSS分数: 7.3
发布时间: 2025-11-13 19:55:57
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v2
漏洞描述
中文描述:

(暂无数据)

英文描述:

Socket Firewall is an HTTP/HTTPS proxy server that intercepts package manager requests and enforces security policies by blocking dangerous packages. Socket Firewall binary versions (separate from installers) prior to 0.15.5 are vulnerable to arbitrary code execution when run in untrusted project directories. The vulnerability allows an attacker to execute arbitrary code by placing a malicious `.sfw.config` file in a project directory. When a developer runs Socket Firewall commands (e.g., `sfw npm install`) in that directory, the tool loads the `.sfw.config` file and populates environment variables directly into the Node.js process. An attacker can exploit this by setting `NODE_OPTIONS` with a `--require` directive to execute malicious JavaScript code before Socket Firewall's security controls are initialized, effectively bypassing the tool's malicious package detection. The attack vector is indirect and requires a developer to install dependencies for an untrusted project and execute a command within the context of the untrusted project. The vulnerability has been patched in Socket Firewall version 0.15.5. Users should upgrade to version 0.15.5 or later. The fix isolates configuration file values from subprocess environments. Look at `sfw --version` for version information. If users rely on the recommended installation mechanism (e.g. global installation via `npm install -g sfw`) then no workaround is necessary. This wrapper package automatically ensures that users are running the latest version of Socket Firewall. Users who have manually installed the binary and cannot immediately upgrade should avoid running Socket Firewall in untrusted project directories. Before running Socket Firewall in any new project, inspect `.sfw.config` and `.env.local` files for suspicious `NODE_OPTIONS` or other environment variable definitions that reference local files.

CWE类型:
CWE-427 CWE-15
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
SocketDev firewall-release < 0.15.5 - - cpe:2.3:a:socketdev:firewall-release:<_0.15.5:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/SocketDev/firewall-release/security/advisories/GHSA-6c5p-vqrh-h6fp x_refsource_CONFIRM
cve.org
访问
https://bsky.app/profile/evilpacket.net/post/3m4iylwxtns2t x_refsource_MISC
cve.org
访问
CVSS评分详情
4.0 (cna)
HIGH
7.3
CVSS向量: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
后续系统影响 (Subsequent):
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2025-11-13 19:55:57
修改时间:
2025-11-13 20:18:33
创建时间:
2026-01-12 02:12:20
更新时间:
2026-01-12 02:28:01
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-64726 2025-11-15 03:17:46 2026-01-12 02:12:20
NVD nvd_CVE-2025-64726 2025-11-15 03:18:45 2026-01-12 02:28:01
版本与语言
当前版本: v2
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
v2 NVD
2026-01-12 02:28:01
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']