KL-001-2025-016: Xorux LPAR2RRD File Upload Directory Traversal Title: Xorux LPAR2RRD File Upload Directory Traversal Advisory ID: KL-001-2025-016 Publication Date: 2025-07-28 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-016.txt 1. Vulnerability Details      Affected Vendor: Xorux      Affected Product: LPAR2RRD      Affected Version: 8.04 and prior      Platform: Rocky Linux 8.10      CWE Classification: CWE-24: Path Traversal: '../filedir',                          CWE-434: Unrestricted Upload of File with                          Dangerous Type, CWE-648: Incorrect Use of                          Privileged APIs      CVE ID: CVE-2025-54769 2. Vulnerability Description      An authenticated, read-only user can upload a file and perform      a directory traversal to have the uploaded file placed in a      location of their choosing.  This can be used to overwrite      existing PERL modules within the application to achieve remote      code execution (RCE) by an attacker. 3. Technical Description      The filename can be altered manually to direct on the local      filesystem on the Xormon Original appliance the upgrade file      should be placed. The Xormon appliance will recognize the      file as not being a valid upgrade package, but still writes      the file to the filesystem. This can be exploited to write      a valid PERL script into the /home/lpar2rrd/lpar2rrd/bin/      directory, where it can be called by existing scripts that      are accessible via https:///lpar2rrd-cgi/