Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64184: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in webcomics dosage

0
High
VulnerabilityCVE-2025-64184cvecve-2025-64184cwe-22
Published: Fri Nov 07 2025 (11/07/2025, 03:02:41 UTC)
Source: CVE Database V5
Vendor/Project: webcomics
Product: dosage

Description

Dosage is a comic strip downloader and archiver. When downloading comic images in versions 3.1 and below, Dosage constructs target file names from different aspects of the remote comic (page URL, image URL, page content, etc.). While the basename is properly stripped of directory-traversing characters, the file extension is taken from the HTTP Content-Type header. This allows a remote attacker (or a Man-in-the-Middle, if the comic is served over HTTP) to write arbitrary files outside the target directory (if additional conditions are met). This issue is fixed in version 3.2.

AI-Powered Analysis

AILast updated: 11/14/2025, 04:49:34 UTC

Technical Analysis

CVE-2025-64184 is a path traversal vulnerability classified under CWE-22, affecting Dosage versions 3.1 and below. Dosage downloads comic strips and archives them by constructing filenames based on various attributes of the remote comic, including the page URL, image URL, and page content. While the software correctly sanitizes the basename of the file to remove directory traversal characters (e.g., '..'), it relies on the HTTP Content-Type header to determine the file extension without validation. This flaw allows an attacker who can control or intercept the HTTP response (either remotely or via man-in-the-middle attacks on unencrypted HTTP connections) to specify a crafted Content-Type header that includes directory traversal sequences or otherwise manipulates the file extension. Consequently, the attacker can cause Dosage to write files outside the intended directory, potentially overwriting critical files or placing malicious files on the victim's system. The vulnerability has a CVSS 3.1 score of 8.8 (high), reflecting its network attack vector, low attack complexity, no required privileges, but requiring user interaction. The impact includes full compromise of confidentiality, integrity, and availability of affected systems. The issue is resolved in Dosage version 3.2, which properly validates and restricts file extensions derived from HTTP headers. No public exploits have been reported yet, but the vulnerability's nature makes it a significant risk, especially where unencrypted HTTP is used or where attackers can intercept traffic.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly for those using Dosage in environments where comic content is downloaded regularly. The ability to write arbitrary files outside the intended directory can lead to unauthorized code execution, data corruption, or system compromise. Confidential information could be exposed or altered, and critical system files could be overwritten, leading to denial of service or persistent malware installation. Organizations relying on Dosage for digital content management, media archiving, or research may face operational disruptions. The risk is heightened in environments where network traffic is not encrypted, allowing man-in-the-middle attackers to exploit the flaw remotely. Additionally, the vulnerability could be leveraged as a foothold in broader attacks targeting media companies, educational institutions, or cultural organizations that use such tools. The lack of authentication and low complexity of exploitation further increase the threat level.

Mitigation Recommendations

European organizations should immediately upgrade Dosage to version 3.2 or later, where this vulnerability is fixed. If upgrading is not immediately feasible, users should avoid downloading comics over unencrypted HTTP connections to prevent man-in-the-middle exploitation. Network defenses should be enhanced to detect and block suspicious HTTP traffic that attempts to manipulate Content-Type headers. Implement strict egress and ingress filtering to limit exposure to untrusted networks. Additionally, running Dosage with least privilege file system permissions can reduce the impact of arbitrary file writes. Monitoring file system changes in directories used by Dosage can help detect exploitation attempts. Organizations should also educate users about the risks of downloading content from untrusted sources and encourage the use of secure protocols (HTTPS). Regular vulnerability scanning and patch management processes should be enforced to prevent similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-28T21:07:16.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690d65e75b03e685488572fe

Added to database: 11/7/2025, 3:22:15 AM

Last enriched: 11/14/2025, 4:49:34 AM

Last updated: 12/22/2025, 3:43:50 PM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats