Description
Open OnDemand is an open-source HPC portal. Users can flood logs by interacting with the shell app and generating many errors. Users who flood logs can create very large log files causing a Denial of Service (DoS) to the ondemand system. This vulnerability is fixed in 3.1.14 and 4.0.6.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/OSC/ondemand/security/advisories/GHSA-x5xv-fw37-v524
Patch x_refsource_misc
https://github.com/OSC/ondemand/commit/40800d68cd019c5f1c48b2deafebba6dff4abee2
Patch x_refsource_misc
https://github.com/OSC/ondemand/commit/96f29b995e1add7562516614e4dc8d961987e8b4
Scores
CVSS v3
5.4
EPSS
0.0009
EPSS Percentile
25.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-400
CWE-779
Status
published
Products (2)
OSC/ondemand
>= 1.6, < 3.1.14
OSC/ondemand
>= 4.0.0-0.rc1, < 4.0.6
Published
Jul 11, 2025
Tracked Since
Feb 18, 2026