Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9h6h-9g78-86f7

Опубликовано: 29 дек. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Yapscan's report receiver server vulnerable to path traversal and log injection

Impact

If you make use of the report receiver server (experimental), a client may be able to forge requests such that arbitrary files on the host can be overwritten (subject to permissions of the yapscan server), leading to loss of data. This is particularly problematic if you do not authenticate clients and/or run the server with elevated permissions.

Patches

Vulnerable versions:

  • v0.18.0
  • v0.19.0 (unreleased)

This problem is patched in version v0.19.1

Workarounds

Update to the newer version is highly encouraged!

Measures to reduce the risk of this include authenticating clients (see --client-ca flag) and containerization of the yapscan server.

References

The tracking issue is #35. There you can find the commits, fixing the issue.

Пакеты

Наименование

github.com/fkie-cad/yapscan

go
Затронутые версииВерсия исправления

>= 0.18.0, < 0.19.1

0.19.1

7.5 High

CVSS3

Дефекты

CWE-117
CWE-22
CWE-73

7.5 High

CVSS3

Дефекты

CWE-117
CWE-22
CWE-73