A security vulnerability has been identified in the Visual Weather's Product Delivery Service (PDS) when using Message Editor Output Filters in specific server configurations. An attacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS pipeline with specially crafted Form Properties, enabling remote execution of arbitrary Python code.
This vulnerability could lead to a complete compromise of the affected server, particularly if Visual Weather services are run under a privileged user account—contrary to the documented installation best practices.
This vulnerability affects the following versions of Visual Weather and derived products (Aero Weather, Satellite Weather):
An attacker leveraging this vulnerability could execute arbitrary Python code and potentially gain unauthorized control of the server.
The vulnerability is triggered in server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled. Attackers can craft malicious requests with specific Form Properties and thus achieving remove code execution.
Immediate Action Required:
Note: Contact IBL Support Team for recommended security guidelines and hardening server configurations to minimise potential exposure to this vulnerability.
This issue was identified and reported by Ianis BERNARD (NCIA), and we thank all parties involved in securing affected systems.