An issue was discovered in the Thermo Fisher Torrent Suite Django application 5.18.1. A remote code execution vulnerability exists in the network configuration functionality, stemming from insufficient input validation when processing network configuration parameters through administrative endpoints. The application allows administrators to modify the server's network configuration through the Django application. This configuration is processed by Bash scripts (TSsetnoproxy and TSsetproxy) that write user-controlled data directly to environment variables without proper sanitization. After updating environment variables, the scripts execute a source command on /etc/environment; if an attacker injects malicious data into environment variables, this command can enable arbitrary command execution. The vulnerability begins with the /admin/network endpoint, which passes user-supplied form data as arguments to subprocess.Popen calls. The user-supplied input is then used to update environment variables in TSsetnoproxy and TSsetproxy, and finally source $environment is executed.
History

Thu, 04 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Thermofisher
Thermofisher torrent Suite
Vendors & Products Thermofisher
Thermofisher torrent Suite

Thu, 04 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Description An issue was discovered in the Thermo Fisher Torrent Suite Django application 5.18.1. A remote code execution vulnerability exists in the network configuration functionality, stemming from insufficient input validation when processing network configuration parameters through administrative endpoints. The application allows administrators to modify the server's network configuration through the Django application. This configuration is processed by Bash scripts (TSsetnoproxy and TSsetproxy) that write user-controlled data directly to environment variables without proper sanitization. After updating environment variables, the scripts execute a source command on /etc/environment; if an attacker injects malicious data into environment variables, this command can enable arbitrary command execution. The vulnerability begins with the /admin/network endpoint, which passes user-supplied form data as arguments to subprocess.Popen calls. The user-supplied input is then used to update environment variables in TSsetnoproxy and TSsetproxy, and finally source $environment is executed.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-12-04T00:00:00.000Z

Updated: 2025-12-04T14:57:00.961Z

Reserved: 2025-07-18T00:00:00.000Z

Link: CVE-2025-54306

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-04T15:15:59.030

Modified: 2025-12-04T17:15:08.283

Link: CVE-2025-54306

cve-icon Redhat

No data.