4get-api

Installation

Install from the command line using your preferred container software:

Docker

docker pull oci.registry.sudovanilla.org/4get-api:arm64

Podman

podman pull oci.registry.sudovanilla.org/4get-api:arm64

Vulnerabilities

CRITICAL

libxml: Heap use after free (UAF) leads to Denial of service (DoS)

CVE-2025-49794

A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.

Reference: https://avd.aquasec.com/nvd/cve-2025-49794

CRITICAL

libxml: Type confusion leads to Denial of service (DoS)

CVE-2025-49796

A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.

Reference: https://avd.aquasec.com/nvd/cve-2025-49796

HIGH

libxml: Null pointer dereference leads to Denial of service (DoS)

CVE-2025-49795

A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.

Reference: https://avd.aquasec.com/nvd/cve-2025-49795

HIGH

mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals

CVE-2025-55753

An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds. This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.

Reference: https://avd.aquasec.com/nvd/cve-2025-55753

HIGH

httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=...

CVE-2025-58098

Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives. This issue affects Apache HTTP Server before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.

Reference: https://avd.aquasec.com/nvd/cve-2025-58098

HIGH

httpd: Apache HTTP Server: NTLM Leakage on Windows via SSRF

CVE-2025-59775

Server-Side Request Forgery (SSRF) vulnerability  in Apache HTTP Server on Windows with AllowEncodedSlashes On and MergeSlashes Off  allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.66, which fixes the issue.

Reference: https://avd.aquasec.com/nvd/cve-2025-59775

HIGH

libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2

CVE-2025-6021

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

Reference: https://avd.aquasec.com/nvd/cve-2025-6021

HIGH

libpng: LIBPNG buffer overflow

CVE-2025-64720

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha × 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.

Reference: https://avd.aquasec.com/nvd/cve-2025-64720

HIGH

libpng: LIBPNG heap buffer overflow

CVE-2025-65018

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.

Reference: https://avd.aquasec.com/nvd/cve-2025-65018

HIGH

libpng: LIBPNG out-of-bounds read in png_image_read_composite

CVE-2025-66293

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng's simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng's internal state management. Upgrade to libpng 1.6.52 or later.

Reference: https://avd.aquasec.com/nvd/cve-2025-66293

Not Signed