Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66029: CWE-522: Insufficiently Protected Credentials in OSC ondemand

0
High
VulnerabilityCVE-2025-66029cvecve-2025-66029cwe-522cwe-523
Published: Wed Dec 17 2025 (12/17/2025, 22:32:51 UTC)
Source: CVE Database V5
Vendor/Project: OSC
Product: ondemand

Description

Open OnDemand provides remote web access to supercomputers. In versions 4.0.8 and prior, the Apache proxy allows sensitive headers to be passed to origin servers. This means malicious users can create an origin server on a compute node that record these headers when unsuspecting users connect to it. Maintainers anticipate a patch in a 4.1 release. Workarounds exist for 4.0.x versions. Using `custom_location_directives` in `ood_portal.yml` in version 4.0.x (not available for versions below 4.0) centers can unset and or edit these headers. Note that `OIDCPassClaimsAs both` is the default and centers can set `OIDCPassClaimsAs ` to `none` or `environment` to stop passing these headers to the client. Centers that have an OIDC provider with the `OIDCPassClaimsAs` with `none` or `environment` settings can adjust the settings using guidance provided in GHSA-2cwp-8g29-9q32 to unset the mod_auth_openidc_session cookies.

AI-Powered Analysis

AILast updated: 12/25/2025, 00:10:15 UTC

Technical Analysis

Open OnDemand is a web-based platform that provides remote access to supercomputers, widely used in HPC environments. Versions 4.0.8 and earlier contain a vulnerability (CVE-2025-66029) where the Apache proxy component forwards sensitive HTTP headers to origin servers without sufficient protection. This behavior allows a malicious user with some level of access to deploy a rogue origin server on a compute node, which can then capture these sensitive headers when legitimate users connect. The headers may contain authentication tokens or session cookies, leading to credential exposure (CWE-522) and insufficient credential protection (CWE-523). The default configuration uses `OIDCPassClaimsAs both`, which passes claims both as headers and environment variables, increasing risk. Administrators can mitigate exposure by modifying `ood_portal.yml` using `custom_location_directives` to unset or edit headers, and by setting `OIDCPassClaimsAs` to `none` or `environment` to reduce header transmission. These mitigations are available for 4.0.x versions but not earlier. A patch is anticipated in the 4.1 release to address this issue fully. The CVSS 3.1 score of 7.6 reflects a network attack vector with low complexity, requiring privileges and user interaction, with high confidentiality impact, limited integrity impact, and no availability impact. No known exploits are currently in the wild, but the vulnerability poses a significant risk to HPC environments relying on Open OnDemand for remote access.

Potential Impact

For European organizations, particularly those operating supercomputing centers and HPC clusters, this vulnerability poses a substantial risk to the confidentiality of user credentials and session tokens. Exposure of these credentials could allow attackers to impersonate legitimate users, gain unauthorized access to sensitive computational resources, and potentially exfiltrate or manipulate sensitive scientific or industrial data. Given the critical role of HPC in research, energy, finance, and defense sectors across Europe, such breaches could disrupt operations and compromise intellectual property. Although the vulnerability does not directly affect system integrity or availability, the loss of confidentiality alone can have severe operational and reputational consequences. The requirement for some privileges and user interaction limits exploitation to insiders or targeted attacks, but the impact remains high due to the sensitivity of the affected environments.

Mitigation Recommendations

European HPC centers should immediately review their Open OnDemand configurations, especially if running version 4.0.8 or earlier. Administrators should implement the workaround by editing `ood_portal.yml` to include `custom_location_directives` that unset or modify sensitive headers before they reach origin servers. Changing the `OIDCPassClaimsAs` setting from the default `both` to `none` or `environment` reduces the risk of header leakage. Centers using OIDC providers should follow guidance from GHSA-2cwp-8g29-9q32 to unset `mod_auth_openidc_session` cookies appropriately. Monitoring internal network traffic for unauthorized origin servers on compute nodes can help detect attempts to exploit this vulnerability. Planning and testing the upgrade to Open OnDemand 4.1, once released, is critical for a permanent fix. Additionally, implementing strict access controls and auditing user activities on compute nodes can reduce the risk of malicious origin server deployment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-21T01:08:02.614Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943327a058703ef3fcb5ca5

Added to database: 12/17/2025, 10:45:14 PM

Last enriched: 12/25/2025, 12:10:15 AM

Last updated: 2/6/2026, 2:49:43 AM

Views: 1096

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats