CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L
Lifecycle Timeline
1DescriptionNVD
IBM Security Verify Directory (Container) 10.0.0 through 10.0.0.3 IBM Security Verify Directory could be vulnerable to malicious file upload by not validating file type. A privileged user could upload malicious files into the system that can be sent to victims for performing further attacks against the system.
AnalysisAI
IBM Security Verify Directory (Container) versions 10.0.0 through 10.0.0.3 fails to validate uploaded file types, allowing privileged users to upload malicious files that can be distributed to victims for lateral attacks. The vulnerability requires high-privilege credentials but enables integrity compromise and partial availability impact once exploited.
Technical ContextAI
IBM Security Verify Directory is an identity and access management directory service typically deployed in containerized environments. The vulnerability stems from insufficient input validation on file upload functionality, classified as CWE-434 (Unrestricted Upload of File with Dangerous Type). The lack of file type validation means the application accepts executable, script, or other dangerous file formats without sanitization or verification. This is particularly dangerous in directory services which often handle authentication and authorization data, as uploaded malicious files can be retrieved and executed by victims or integrated into workflows.
RemediationAI
Upgrade IBM Security Verify Directory (Container) to version 10.0.0.4 or later. If immediate patching is not feasible, restrict upload functionality to dedicated service accounts with minimal privileges and audit all uploads via container logs or SIEM integration. Implement network segmentation to prevent untrusted users from accessing the file upload interface, and consider disabling file upload features entirely if not required for business operations. Additionally, enforce file type whitelisting at the container level using AppArmor or SELinux policies to restrict what file types the application process can execute. Note that network restriction is only a compensating control and does not eliminate the underlying validation flaw.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209557
GHSA-w9g3-hc6p-qwh3