Open OnDemand is an open-source HPC portal. Prior to versions 4.0.8 and 3.1.16, users can craft a "Time of Check to Time of Use" (TOCTOU) attack when downloading zip files to access files outside of the OOD_ALLOWLIST. This vulnerability impacts sites that use the file browser allowlists in all current versions of OOD. However, files accessed are still protected by the UNIX permissions. Open OnDemand versions 4.0.8 and 3.1.16 have been patched for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Fri, 21 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Nov 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Open OnDemand is an open-source HPC portal. Prior to versions 4.0.8 and 3.1.16, users can craft a "Time of Check to Time of Use" (TOCTOU) attack when downloading zip files to access files outside of the OOD_ALLOWLIST. This vulnerability impacts sites that use the file browser allowlists in all current versions of OOD. However, files accessed are still protected by the UNIX permissions. Open OnDemand versions 4.0.8 and 3.1.16 have been patched for this vulnerability. | |
| Title | Open OnDemand allowlist bypass using symlinks in directory downloads (TOCTOU) | |
| Weaknesses | CWE-367 CWE-61 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-11-20T16:53:13.495Z
Updated: 2025-11-21T16:56:40.807Z
Reserved: 2025-10-20T19:41:22.742Z
Link: CVE-2025-62724
Updated: 2025-11-21T16:56:38.228Z
Status : Awaiting Analysis
Published: 2025-11-20T17:15:51.333
Modified: 2025-11-21T15:13:13.800
Link: CVE-2025-62724
No data.