CVE-2025-64185: CWE-277: Insecure Inherited Permissions in OSC ondemand
Open OnDemand is an open-source HPC portal. Prior to versions 4.0.8 and 3.1.16, Open OnDemand packages create world writable locations in the GEM_PATH. Open OnDemand versions 4.0.8 and 3.1.16 have been patched for this vulnerability.
AI Analysis
Technical Summary
CVE-2025-64185 identifies a security vulnerability in Open OnDemand, a widely used open-source portal for high-performance computing (HPC) environments. The vulnerability stems from the creation of world-writable directories within the GEM_PATH environment variable in versions prior to 4.0.8 and 3.1.16. GEM_PATH is used by RubyGems to locate libraries and executables, and if directories in this path are world-writable, attackers can insert or modify malicious code or libraries that the HPC portal may load or execute. This constitutes an insecure inherited permissions issue (CWE-277) and improper control over critical resources (CWE-552). The vulnerability is remotely exploitable without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact primarily affects integrity, allowing attackers to potentially execute arbitrary code or alter application behavior by manipulating GEM_PATH contents. The CVSS score of 6.9 reflects a medium severity level, balancing ease of exploitation with limited scope of impact. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to HPC environments that rely on Open OnDemand for user access and job management. The issue has been addressed in Open OnDemand versions 4.0.8 and 3.1.16 through patches that remove world-writable permissions from GEM_PATH directories, thereby preventing unauthorized modifications.
Potential Impact
For European organizations, especially those operating HPC clusters and research computing facilities, this vulnerability could lead to unauthorized code execution or manipulation of HPC job workflows. Such integrity compromises may result in corrupted computational results, unauthorized data access, or disruption of critical scientific workloads. Given the collaborative nature of HPC environments, an attacker exploiting this vulnerability could escalate privileges or move laterally within the network. The impact extends to academic institutions, government research centers, and industries relying on HPC for simulations, data analysis, or modeling. Disruption or manipulation of HPC resources can delay research, cause financial losses, and damage reputations. Since Open OnDemand is widely adopted in European HPC centers, the vulnerability presents a tangible risk if unpatched. However, the lack of known exploits and the medium severity rating suggest that immediate catastrophic impact is unlikely but should not be underestimated.
Mitigation Recommendations
1. Upgrade Open OnDemand installations to versions 4.0.8 or 3.1.16 or later to apply official patches that fix the insecure permissions issue. 2. Audit and correct file system permissions on GEM_PATH directories to ensure they are not world-writable; restrict write permissions to trusted administrators only. 3. Implement strict access controls and monitoring on HPC portal environments to detect unauthorized changes to environment variables and directory permissions. 4. Employ runtime integrity monitoring tools to detect unexpected modifications in GEM_PATH or loaded libraries. 5. Educate HPC administrators about the risks of inherited permissions and enforce secure configuration management practices. 6. Consider isolating HPC portal services in containers or sandboxes to limit the impact of potential exploitation. 7. Regularly review and update HPC software dependencies and environment configurations to minimize exposure to similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Italy, Spain, Sweden, Finland, Belgium
CVE-2025-64185: CWE-277: Insecure Inherited Permissions in OSC ondemand
Description
Open OnDemand is an open-source HPC portal. Prior to versions 4.0.8 and 3.1.16, Open OnDemand packages create world writable locations in the GEM_PATH. Open OnDemand versions 4.0.8 and 3.1.16 have been patched for this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2025-64185 identifies a security vulnerability in Open OnDemand, a widely used open-source portal for high-performance computing (HPC) environments. The vulnerability stems from the creation of world-writable directories within the GEM_PATH environment variable in versions prior to 4.0.8 and 3.1.16. GEM_PATH is used by RubyGems to locate libraries and executables, and if directories in this path are world-writable, attackers can insert or modify malicious code or libraries that the HPC portal may load or execute. This constitutes an insecure inherited permissions issue (CWE-277) and improper control over critical resources (CWE-552). The vulnerability is remotely exploitable without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact primarily affects integrity, allowing attackers to potentially execute arbitrary code or alter application behavior by manipulating GEM_PATH contents. The CVSS score of 6.9 reflects a medium severity level, balancing ease of exploitation with limited scope of impact. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to HPC environments that rely on Open OnDemand for user access and job management. The issue has been addressed in Open OnDemand versions 4.0.8 and 3.1.16 through patches that remove world-writable permissions from GEM_PATH directories, thereby preventing unauthorized modifications.
Potential Impact
For European organizations, especially those operating HPC clusters and research computing facilities, this vulnerability could lead to unauthorized code execution or manipulation of HPC job workflows. Such integrity compromises may result in corrupted computational results, unauthorized data access, or disruption of critical scientific workloads. Given the collaborative nature of HPC environments, an attacker exploiting this vulnerability could escalate privileges or move laterally within the network. The impact extends to academic institutions, government research centers, and industries relying on HPC for simulations, data analysis, or modeling. Disruption or manipulation of HPC resources can delay research, cause financial losses, and damage reputations. Since Open OnDemand is widely adopted in European HPC centers, the vulnerability presents a tangible risk if unpatched. However, the lack of known exploits and the medium severity rating suggest that immediate catastrophic impact is unlikely but should not be underestimated.
Mitigation Recommendations
1. Upgrade Open OnDemand installations to versions 4.0.8 or 3.1.16 or later to apply official patches that fix the insecure permissions issue. 2. Audit and correct file system permissions on GEM_PATH directories to ensure they are not world-writable; restrict write permissions to trusted administrators only. 3. Implement strict access controls and monitoring on HPC portal environments to detect unauthorized changes to environment variables and directory permissions. 4. Employ runtime integrity monitoring tools to detect unexpected modifications in GEM_PATH or loaded libraries. 5. Educate HPC administrators about the risks of inherited permissions and enforce secure configuration management practices. 6. Consider isolating HPC portal services in containers or sandboxes to limit the impact of potential exploitation. 7. Regularly review and update HPC software dependencies and environment configurations to minimize exposure to similar vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-28T21:07:16.440Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691f4b4ed2e902043d281088
Added to database: 11/20/2025, 5:09:34 PM
Last enriched: 11/20/2025, 5:20:45 PM
Last updated: 11/20/2025, 8:18:25 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-9979: Use After Free
MediumCVE-2024-9779: Trust Boundary Violation
HighUnquoted Paths: The Decades-Old Windows Flaw Still Enabling Hidden Code Execution
MediumCVE-2023-4001: Authentication Bypass by Spoofing in Red Hat Red Hat Enterprise Linux 9
MediumCVE-2023-3961: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Red Hat Red Hat Enterprise Linux 8
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.