Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c9p4-xwr9-rfhx

Опубликовано: 17 янв. 2025
Источник: github
Github: Прошло ревью
CVSS3: 7.3

Описание

Zot IdP group membership revocation ignored

Summary

The group data stored for users in the boltdb database (meta.db) is an append-list so group revocations/removals are ignored in the API.

Details

SetUserGroups is alled on login, but instead of replacing the group memberships, they are appended. This may be due to some conflict with the group definitions in the config file, but that wasn't obvious to me if it were the case.

PoC

Login with group claims, logout, remove the user from a group from at IdP and log in again, the API still grants access and the new list of groups is appended creating meaningless duplicate entries and no longer mathing the expected groups from the IdP. The behavior can be verified by seeing the API or UI still presenting images it should not or by viewing the data directly: bbolt get meta.db UserData <user>, eg:

image

Note this example also has duplicates due to group hierarchy changes that were left in the database.

Impact

Any Zot configuration that relies on group-based authorization will not respect group remove/revocation by an IdP.

Пакеты

Наименование

zotregistry.dev/zot

go
Затронутые версииВерсия исправления

<= 2.1.1

2.1.2

EPSS

Процентиль: 40%
0.00182
Низкий

7.3 High

CVSS3

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 7.3
nvd
около 1 года назад

zot is a production-ready vendor-neutral OCI image registry. The group data stored for users in the boltdb database (meta.db) is an append-list so group revocations/removals are ignored in the API. SetUserGroups is alled on login, but instead of replacing the group memberships, they are appended. This may be due to some conflict with the group definitions in the config file, but that wasn't obvious to me if it were the case. Any Zot configuration that relies on group-based authorization will not respect group remove/revocation by an IdP. This issue has been addressed in version 2.1.2. All users are advised to upgrade. There are no known workarounds for this vulnerability.

suse-cvrf
около 1 года назад

Security update for govulncheck-vulndb

EPSS

Процентиль: 40%
0.00182
Низкий

7.3 High

CVSS3

Дефекты

CWE-269