CVE-2025-55523 Scanner
CVE-2025-55523 Scanner - Arbitrary File Download vulnerability in Agent-Zero
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
8 days 22 hours
Scan only one
URL
Toolbox
Agent-Zero is a software product typically utilized in environments requiring robust task automation and data management solutions. It is deployed by enterprises across various sectors to facilitate efficient workflow orchestration and data processing tasks. The software is widely used in development and production environments, with its scalability making it suitable for both small and large-scale implementations. A staple in the automation software market, Agent-Zero assists teams in streamlining operations and minimizing manual intervention. Users of Agent-Zero include system administrators, developers, and operational teams looking for a seamless task management experience. The software's flexibility allows it to be adapted to meet the specific needs of different organizational workflows.
The vulnerability in question is an 'Arbitrary File Download' type, which poses a significant risk to data integrity and confidentiality. This vulnerability exists due to improper validation processes in the download feature of Agent-Zero. Exploiting this vulnerability could allow unauthorized users to download sensitive or protected files from the system using crafted requests. It effectively exposes the system to data theft and potential unauthorized access. The vulnerability is particularly concerning because it bypasses standard access controls, thereby putting sensitive information at risk. Swift detection and mitigation of this vulnerability are crucial to maintaining the system's security posture.
Examining the vulnerability details reveals that the core issue lies within the '/api/download_work_dir_file.py' endpoint. The absence of rigorous access validation mechanisms enables attackers to leverage path traversal techniques to access files outside the intended directories. Specifically, the vulnerability can be triggered by sending a crafted HTTP GET request with a manipulated file path parameter. Successful exploitation is identified by the presence of specific strings in the response body and headers, such as 'root:.*:0:0:' in the body and 'filename=passwd' in the headers. The vulnerability has been attributed to the lax validation policies around the file download process, necessitating immediate remedial action.
If exploited, the consequences of this vulnerability could be severe, resulting in unauthorized access to sensitive data such as system configuration files or personal data contained within the server. The exposure of such information could lead to further attacks, including privilege escalation or even system compromise. Businesses could face significant reputational damage and potential legal repercussions due to data privacy concerns. There could also be operational disruptions as the integrity of the system's data becomes questionable. Overall, the exploitation of this vulnerability could lead to substantial financial and strategic losses for affected organizations.
REFERENCES