Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q78p-g86f-jg6q

Опубликовано: 29 июл. 2025
Источник: github
Github: Прошло ревью
CVSS4: 7.1

Описание

Bugsink path traversal via event_id in ingestion

Summary

In affected versions, ingestion paths construct file locations directly from untrusted event_id input without validation. A specially crafted event_id can result in paths outside the intended directory, potentially allowing file overwrite or creation in arbitrary locations.

Submitting such input requires access to a valid DSN. While that limits exposure, DSNs are sometimes discoverable—for example, when included in frontend code—and should not be treated as a strong security boundary.

Impact

A valid DSN holder can craft an event_id that causes the ingestion process to write files outside its designated directory. This allows overwriting files accessible to the user running Bugsink.

If Bugsink runs in a container, the effect is confined to the container’s filesystem. In non-containerized setups, the overwrite may affect other parts of the system accessible to that user.

Mitigation

Update to version 1.7.4, 1.6.4, 1.5.5 or 1.4.3 , which require event_id to be a valid UUID and normalizes it before use in file paths.

Пакеты

Наименование

bugsink

pip
Затронутые версииВерсия исправления

>= 1.7.0, < 1.7.4

1.7.4

Наименование

bugsink

pip
Затронутые версииВерсия исправления

>= 1.6.0, < 1.6.4

1.6.4

Наименование

bugsink

pip
Затронутые версииВерсия исправления

>= 1.5.0, < 1.5.5

1.5.5

Наименование

bugsink

pip
Затронутые версииВерсия исправления

< 1.4.3

1.4.3

EPSS

Процентиль: 41%
0.00191
Низкий

7.1 High

CVSS4

Дефекты

CWE-22

Связанные уязвимости

nvd
6 месяцев назад

Bugsink is a self-hosted error tracking service. In versions 1.4.2 and below, 1.5.0 through 1.5.4, 1.6.0 through 1.6.3, and 1.7.0 through 1.7.3, ingestion paths construct file locations directly from untrusted event_id input without validation. A specially crafted event_id can result in paths outside the intended directory, potentially allowing file overwrite or creation in arbitrary locations. Submitting such input requires access to a valid DSN, potentially exposing them. If Bugsink runs in a container, the effect is confined to the container’s filesystem. In non-containerized setups, the overwrite may affect other parts of the system accessible to that user. This is fixed in versions 1.4.3, 1.5.5, 1.6.4 and 1.7.4.

EPSS

Процентиль: 41%
0.00191
Низкий

7.1 High

CVSS4

Дефекты

CWE-22