Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3gv2-v3jx-r9fh

Опубликовано: 10 июл. 2025
Источник: github
Github: Прошло ревью
CVSS4: 8.8
CVSS3: 9.1

Описание

Chall-Manager is vulnerable to Path Traversal when extracting/decoding a zip archive

Impact

When decoding a scenario (i.e. a zip archive), the path of the file to write is not checked, potentially leading to zip slips. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system.

Patches

Patch has been implemented by commit 47d188f and shipped in v0.1.4.

Workarounds

No workaround exist.

References

N/A.

Пакеты

Наименование

github.com/ctfer-io/chall-manager

go
Затронутые версииВерсия исправления

< 0.1.4

0.1.4

EPSS

Процентиль: 14%
0.00046
Низкий

8.8 High

CVSS4

9.1 Critical

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 9.1
nvd
5 месяцев назад

Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the path of the file to write is not checked, potentially leading to zip slips. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 47d188f and shipped in v0.1.4.

EPSS

Процентиль: 14%
0.00046
Низкий

8.8 High

CVSS4

9.1 Critical

CVSS3

Дефекты

CWE-22