Skip to main content

CVE-2025-53636: CWE-400: Uncontrolled Resource Consumption in OSC ondemand

Medium
VulnerabilityCVE-2025-53636cvecve-2025-53636cwe-400cwe-779
Published: Fri Jul 11 2025 (07/11/2025, 21:20:14 UTC)
Source: CVE Database V5
Vendor/Project: OSC
Product: ondemand

Description

Open OnDemand is an open-source HPC portal. Users can flood logs by interacting with the shell app and generating many errors. Users who flood logs can create very large log files causing a Denial of Service (DoS) to the ondemand system. This vulnerability is fixed in 3.1.14 and 4.0.6.

AI-Powered Analysis

AILast updated: 07/19/2025, 20:57:39 UTC

Technical Analysis

CVE-2025-53636 is a medium severity vulnerability affecting Open OnDemand (ondemand), an open-source High Performance Computing (HPC) portal developed by the Open Science Grid Consortium (OSC). The vulnerability is categorized under CWE-400 (Uncontrolled Resource Consumption) and CWE-779 (Log Injection). It arises when users interact with the shell application component of ondemand in a manner that generates numerous errors, thereby flooding the system logs. This excessive logging leads to the creation of very large log files, which can exhaust disk space or other system resources, ultimately causing a Denial of Service (DoS) condition that disrupts the availability of the ondemand portal. The vulnerability affects ondemand versions from 1.6 up to but not including 3.1.14, and from 4.0.0-0.rc1 up to but not including 4.0.6. The flaw does not require user interaction and can be exploited remotely with low complexity, but requires low-level privileges (PR:L). The CVSS v3.1 base score is 5.4, reflecting a medium severity level with no impact on confidentiality, limited impact on integrity, and significant impact on availability. No known exploits are currently reported in the wild. The vulnerability has been addressed in ondemand versions 3.1.14 and 4.0.6, where proper controls on logging and resource consumption have been implemented to prevent log flooding and resource exhaustion.

Potential Impact

For European organizations utilizing Open OnDemand as a portal for HPC resource management, this vulnerability poses a risk of service disruption. HPC environments are critical for research institutions, universities, and industries relying on computational resources for scientific simulations, data analysis, and engineering tasks. A successful exploitation could lead to denial of service, halting access to HPC resources and delaying critical workloads. This can impact research timelines, operational efficiency, and potentially lead to financial losses or reputational damage. Since ondemand is often deployed in multi-user environments, malicious or careless users could intentionally or unintentionally trigger this vulnerability, affecting all users of the system. The lack of confidentiality impact reduces risk of data leakage, but the availability impact is significant in environments where HPC portals are central to operations. Additionally, recovery from a DoS caused by log flooding may require administrative intervention and system restarts, increasing downtime.

Mitigation Recommendations

European organizations should immediately verify their ondemand version and upgrade to 3.1.14 or 4.0.6 or later to apply the official patch. Until patched, administrators should implement strict user activity monitoring and limit the ability of users to generate excessive errors in the shell app. Implementing quota controls on log file sizes and disk usage can help prevent resource exhaustion. Additionally, configuring log rotation policies with aggressive rotation and compression can mitigate log file growth. Restricting shell app access to trusted users and enforcing least privilege principles reduces the risk of exploitation. Network-level controls such as rate limiting and anomaly detection can identify and block attempts to flood logs. Regular auditing of log files and system resource usage will help detect early signs of exploitation. Finally, organizations should prepare incident response plans to quickly recover from potential DoS events caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-07T14:20:38.390Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6871829aa83201eaacb16c8a

Added to database: 7/11/2025, 9:31:06 PM

Last enriched: 7/19/2025, 8:57:39 PM

Last updated: 8/17/2025, 12:47:32 AM

Views: 29

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats