Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64185: CWE-277: Insecure Inherited Permissions in OSC ondemand

0
Medium
VulnerabilityCVE-2025-64185cvecve-2025-64185cwe-277cwe-552
Published: Thu Nov 20 2025 (11/20/2025, 16:58:01 UTC)
Source: CVE Database V5
Vendor/Project: OSC
Product: ondemand

Description

Open OnDemand is an open-source HPC portal. Prior to versions 4.0.8 and 3.1.16, Open OnDemand packages create world writable locations in the GEM_PATH. Open OnDemand versions 4.0.8 and 3.1.16 have been patched for this vulnerability.

AI-Powered Analysis

AILast updated: 11/20/2025, 17:20:45 UTC

Technical Analysis

CVE-2025-64185 identifies a security vulnerability in Open OnDemand, a widely used open-source portal for high-performance computing (HPC) environments. The vulnerability stems from the creation of world-writable directories within the GEM_PATH environment variable in versions prior to 4.0.8 and 3.1.16. GEM_PATH is used by RubyGems to locate libraries and executables, and if directories in this path are world-writable, attackers can insert or modify malicious code or libraries that the HPC portal may load or execute. This constitutes an insecure inherited permissions issue (CWE-277) and improper control over critical resources (CWE-552). The vulnerability is remotely exploitable without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact primarily affects integrity, allowing attackers to potentially execute arbitrary code or alter application behavior by manipulating GEM_PATH contents. The CVSS score of 6.9 reflects a medium severity level, balancing ease of exploitation with limited scope of impact. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to HPC environments that rely on Open OnDemand for user access and job management. The issue has been addressed in Open OnDemand versions 4.0.8 and 3.1.16 through patches that remove world-writable permissions from GEM_PATH directories, thereby preventing unauthorized modifications.

Potential Impact

For European organizations, especially those operating HPC clusters and research computing facilities, this vulnerability could lead to unauthorized code execution or manipulation of HPC job workflows. Such integrity compromises may result in corrupted computational results, unauthorized data access, or disruption of critical scientific workloads. Given the collaborative nature of HPC environments, an attacker exploiting this vulnerability could escalate privileges or move laterally within the network. The impact extends to academic institutions, government research centers, and industries relying on HPC for simulations, data analysis, or modeling. Disruption or manipulation of HPC resources can delay research, cause financial losses, and damage reputations. Since Open OnDemand is widely adopted in European HPC centers, the vulnerability presents a tangible risk if unpatched. However, the lack of known exploits and the medium severity rating suggest that immediate catastrophic impact is unlikely but should not be underestimated.

Mitigation Recommendations

1. Upgrade Open OnDemand installations to versions 4.0.8 or 3.1.16 or later to apply official patches that fix the insecure permissions issue. 2. Audit and correct file system permissions on GEM_PATH directories to ensure they are not world-writable; restrict write permissions to trusted administrators only. 3. Implement strict access controls and monitoring on HPC portal environments to detect unauthorized changes to environment variables and directory permissions. 4. Employ runtime integrity monitoring tools to detect unexpected modifications in GEM_PATH or loaded libraries. 5. Educate HPC administrators about the risks of inherited permissions and enforce secure configuration management practices. 6. Consider isolating HPC portal services in containers or sandboxes to limit the impact of potential exploitation. 7. Regularly review and update HPC software dependencies and environment configurations to minimize exposure to similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-28T21:07:16.440Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691f4b4ed2e902043d281088

Added to database: 11/20/2025, 5:09:34 PM

Last enriched: 11/20/2025, 5:20:45 PM

Last updated: 11/20/2025, 8:18:25 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats