Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2024-02253

Опубликовано: 04 нояб. 2023
Источник: fstec
CVSS3: 7.5
CVSS2: 7.8
EPSS Низкий

Описание

Уявимость пакетного менеджера Apache Ivy связана с неверным ограничением имени пути к каталогу с ограниченным доступом. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, получить несанкционированный доступ к файловой системе

Вендор

Red Hat Inc.
Novell Inc.
ООО «Ред Софт»
Apache Software Foundation
JetBrains

Наименование ПО

Red Hat Enterprise Linux
Red Hat JBoss Fuse
Red Hat Software Collections
Red Hat Single Sign-On
Red Hat JBoss Data Grid
SUSE Linux Enterprise Module for Development Tools
Suse Linux Enterprise Server
Red Hat Integration Camel K
Red Hat Integration Camel Quarkus
Red Hat Data Grid
Red Hat JBoss Enterprise Application Platform Expansion Pack
РЕД ОС
SUSE Linux Enterprise High Performance Computing
SUSE Linux Enterprise Server for SAP Applications
SUSE Manager Proxy
SUSE Manager Server
Suse Linux Enterprise Desktop
SUSE Enterprise Storage
SUSE Manager Retail Branch Server
SUSE Linux Enterprise Real Time
SUSE Linux Enterprise Server Business Critical Linux
Migration Toolkit for Applications
Migration Toolkit for Runtimes
Red Hat JBoss Enterprise Application Platform
Red Hat Integration Camel for Spring Boot
Apache Ivy
Scala Plugin for IntelliJ IDEA

Версия ПО

7 (Red Hat Enterprise Linux)
7 (Red Hat JBoss Fuse)
- (Red Hat Software Collections)
7 (Red Hat Single Sign-On)
7 (Red Hat JBoss Data Grid)
15 SP2 (SUSE Linux Enterprise Module for Development Tools)
15 SP 3 (Suse Linux Enterprise Server)
- (Red Hat Integration Camel K)
- (Red Hat Integration Camel Quarkus)
8 (Red Hat Data Grid)
- (Red Hat JBoss Enterprise Application Platform Expansion Pack)
7.3 (РЕД ОС)
15 SP3 (SUSE Linux Enterprise High Performance Computing)
15 SP3 (SUSE Linux Enterprise Server for SAP Applications)
4.2 (SUSE Manager Proxy)
4.2 (SUSE Manager Server)
15 SP3 (Suse Linux Enterprise Desktop)
7 (SUSE Enterprise Storage)
15 SP2 (Suse Linux Enterprise Server)
15 SP2 (SUSE Linux Enterprise Server for SAP Applications)
4.1 (SUSE Manager Server)
4.1 (SUSE Manager Proxy)
15 SP2-ESPOS (SUSE Linux Enterprise High Performance Computing)
15 SP2-LTSS (SUSE Linux Enterprise High Performance Computing)
15 SP3 (SUSE Linux Enterprise Module for Development Tools)
4.1 (SUSE Manager Retail Branch Server)
15 SP4 (Suse Linux Enterprise Server)
15 SP2 (Suse Linux Enterprise Desktop)
15 SP2 (SUSE Linux Enterprise High Performance Computing)
15 SP4 (Suse Linux Enterprise Desktop)
15 SP2-BCL (Suse Linux Enterprise Server)
15 SP4 (SUSE Linux Enterprise Server for SAP Applications)
4.2 (SUSE Manager Retail Branch Server)
15 SP2-LTSS (Suse Linux Enterprise Server)
15 SP2 (SUSE Linux Enterprise Real Time)
4.3 (SUSE Manager Retail Branch Server)
4.3 (SUSE Manager Proxy)
4.3 (SUSE Manager Server)
15 SP4 (SUSE Linux Enterprise High Performance Computing)
7.1 (SUSE Enterprise Storage)
15 SP4 (SUSE Linux Enterprise Module for Development Tools)
15 SP2 (SUSE Linux Enterprise Server Business Critical Linux)
15 SP3-LTSS (Suse Linux Enterprise Server)
15 SP3-ESPOS (SUSE Linux Enterprise High Performance Computing)
15 SP3-LTSS (SUSE Linux Enterprise High Performance Computing)
15 SP3 (SUSE Linux Enterprise Real Time)
15 SP3-BCL (Suse Linux Enterprise Server)
15 SP5 (SUSE Linux Enterprise Server for SAP Applications)
15 SP5 (Suse Linux Enterprise Server)
15 SP5 (Suse Linux Enterprise Desktop)
6 (Migration Toolkit for Applications)
15 SP5 (SUSE Linux Enterprise High Performance Computing)
15 SP5 (SUSE Linux Enterprise Module for Development Tools)
15 SP4 (SUSE Linux Enterprise Real Time)
- (Migration Toolkit for Runtimes)
7 (Red Hat JBoss Enterprise Application Platform)
3.20.1 (Red Hat Integration Camel for Spring Boot)
6 (Red Hat JBoss Enterprise Application Platform)
15 SP4-ESPOS (SUSE Linux Enterprise High Performance Computing)
15 SP4-LTSS (SUSE Linux Enterprise High Performance Computing)
15 SP4-LTSS (Suse Linux Enterprise Server)
15 SP3 (SUSE Linux Enterprise Server Business Critical Linux)
до 2.5.0 включительно (Apache Ivy)
2022.1.17 (Scala Plugin for IntelliJ IDEA)

Тип ПО

Операционная система
Прикладное ПО информационных систем
Сетевое программное средство
Сетевое средство

Операционные системы и аппаратные платформы

Red Hat Inc. Red Hat Enterprise Linux 7
Novell Inc. Suse Linux Enterprise Server 15 SP 3
ООО «Ред Софт» РЕД ОС 7.3
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP3
Novell Inc. Suse Linux Enterprise Desktop 15 SP3
Novell Inc. Suse Linux Enterprise Server 15 SP2
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP2
Novell Inc. Suse Linux Enterprise Server 15 SP4
Novell Inc. Suse Linux Enterprise Desktop 15 SP2
Novell Inc. Suse Linux Enterprise Desktop 15 SP4
Novell Inc. Suse Linux Enterprise Server 15 SP2-BCL
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP4
Novell Inc. Suse Linux Enterprise Server 15 SP2-LTSS
Novell Inc. SUSE Linux Enterprise Real Time 15 SP2
Novell Inc. SUSE Linux Enterprise Server Business Critical Linux 15 SP2
Novell Inc. Suse Linux Enterprise Server 15 SP3-LTSS
Novell Inc. SUSE Linux Enterprise Real Time 15 SP3
Novell Inc. Suse Linux Enterprise Server 15 SP3-BCL
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP5
Novell Inc. Suse Linux Enterprise Server 15 SP5
Novell Inc. Suse Linux Enterprise Desktop 15 SP5
Novell Inc. SUSE Linux Enterprise Real Time 15 SP4
Novell Inc. Suse Linux Enterprise Server 15 SP4-LTSS
Novell Inc. SUSE Linux Enterprise Server Business Critical Linux 15 SP3

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,8)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 7,5)

Возможные меры по устранению уязвимости

Использование рекомендаций:
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2022-37866.html
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/CVE-2022-37866
Для программных продуктов Apache Software Foundation:
https://ant.apache.org/ivy/
Для РЕД ОС:
https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-apache-ivy-cve-2022-37866-cve-2022-37865/?sphrase_id=592508
Компенсирующие меры для программных продуктов JetBrains:
- использование антивирусного программного обеспечения для отслеживания средств эксплуатации уязвимости.

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 67%
0.00544
Низкий

7.5 High

CVSS3

7.8 High

CVSS2

Связанные уязвимости

CVSS3: 9.1
redos
7 месяцев назад

Множественные уязвимости apache-ivy

CVSS3: 7.5
redhat
больше 2 лет назад

When Apache Ivy downloads artifacts from a repository it stores them in the local file system based on a user-supplied "pattern" that may include placeholders for artifacts coordinates like the organisation, module or version. If said coordinates contain "../" sequences - which are valid characters for Ivy coordinates in general - it is possible the artifacts are stored outside of Ivy's local cache or repository or can overwrite different artifacts inside of the local cache. In order to exploit this vulnerability an attacker needs collaboration by the remote repository as Ivy will issue http requests containing ".." sequences and a "normal" repository will not interpret them as part of the artifact coordinates. Users of Apache Ivy 2.0.0 to 2.5.1 should upgrade to Ivy 2.5.1.

CVSS3: 7.5
nvd
больше 2 лет назад

When Apache Ivy downloads artifacts from a repository it stores them in the local file system based on a user-supplied "pattern" that may include placeholders for artifacts coordinates like the organisation, module or version. If said coordinates contain "../" sequences - which are valid characters for Ivy coordinates in general - it is possible the artifacts are stored outside of Ivy's local cache or repository or can overwrite different artifacts inside of the local cache. In order to exploit this vulnerability an attacker needs collaboration by the remote repository as Ivy will issue http requests containing ".." sequences and a "normal" repository will not interpret them as part of the artifact coordinates. Users of Apache Ivy 2.0.0 to 2.5.1 should upgrade to Ivy 2.5.1.

CVSS3: 7.5
github
больше 2 лет назад

Apache Ivy vulnerable to path traversal

EPSS

Процентиль: 67%
0.00544
Низкий

7.5 High

CVSS3

7.8 High

CVSS2