Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qpgx-64h2-gc3c

Опубликовано: 17 июн. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Insecure path traversal in Git Trigger Source can lead to arbitrary file read

Impact

A path traversal issue was found in the (g *GitArtifactReader).Read() API. Read() calls into (g *GitArtifactReader).readFromRepository() that opens and reads the file that contains the trigger resource definition:

func (g *GitArtifactReader) readFromRepository(r *git.Repository, dir string)

No checks are made on this file at read time, which could lead an attacker to read files anywhere on the system. This could be achieved by either using symbolic links, or putting ../ in the path.

Patches

A patch for this vulnerability has been released in the following Argo Events version:

v1.7.1

Credits

Disclosed by Ada Logics in a security audit sponsored by CNCF and facilitated by OSTIF.

For more information

Open an issue in the Argo Events issue tracker or discussions Join us on Slack in channel #argo-events

Пакеты

Наименование

github.com/argoproj/argo-events

go
Затронутые версииВерсия исправления

< 1.7.1

1.7.1

EPSS

Процентиль: 74%
0.0081
Низкий

7.5 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 7.5
nvd
больше 3 лет назад

The package github.com/argoproj/argo-events/sensors/artifacts before 1.7.1 are vulnerable to Directory Traversal in the (g *GitArtifactReader).Read() API in git.go. This could allow arbitrary file reads if the GitArtifactReader is provided a pathname containing a symbolic link or an implicit directory name such as ...

EPSS

Процентиль: 74%
0.0081
Низкий

7.5 High

CVSS3

Дефекты

CWE-22