Описание
A flaw was found in flatpak-builder. A specially crafted manifest or source can bypass path restrictions by using symbolic links within the license-files field, allowing the builder to follow paths outside the intended source directory, reading arbitrary files from the host system and including them in the build output. As a result, sensitive data from the host environment may be exposed in the resulting application package.
Отчет
To exploit this issue, an attacker needs to convince a user to build a package via a crafted manifest or source, specifically, with a malicious license-files field. In automated build systems where untrusted packages may be processed, this issue can be exploited without user interaction but the attacker still has to introduce a malicious manifest into the build queue. Due to these reasons, this flaw has been rated with a moderate severity.
Меры по смягчению последствий
To mitigate this issue, audit untrusted manifests and sources for suspicious license-files paths. Additionally, consider running the build process inside a container or a restricted sandbox environment to ensure the builder cannot access sensitive host files or credentials.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 10 | flatpak-builder | Not affected | ||
| Red Hat Enterprise Linux 8 | flatpak-builder | Not affected | ||
| Red Hat Enterprise Linux 9 | flatpak-builder | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
5.5 Medium
CVSS3
Связанные уязвимости
flatpak-builder is a tool to build flatpaks from source. From 1.4.5 to before 1.4.8, the license-files manifest key takes an array of paths to user defined licence files relative to the source directory of the module. The paths from that array are resolved using g_file_resolve_relative_path() and validated to stay inside the source directory using two checks - g_file_get_relative_path() which does not resolve symlinks and g_file_query_file_type() with G_FILE_QUERY_INFO_NOFOLLOW_SYMLINKS which only applies to the final path component. The copy operation runs on host. This can be exploited by using a crafted manifest and/or source to read arbitrary files from the host and capture them into the build output. This vulnerability is fixed in 1.4.8.
flatpak-builder is a tool to build flatpaks from source. From 1.4.5 to before 1.4.8, the license-files manifest key takes an array of paths to user defined licence files relative to the source directory of the module. The paths from that array are resolved using g_file_resolve_relative_path() and validated to stay inside the source directory using two checks - g_file_get_relative_path() which does not resolve symlinks and g_file_query_file_type() with G_FILE_QUERY_INFO_NOFOLLOW_SYMLINKS which only applies to the final path component. The copy operation runs on host. This can be exploited by using a crafted manifest and/or source to read arbitrary files from the host and capture them into the build output. This vulnerability is fixed in 1.4.8.
flatpak-builder is a tool to build flatpaks from source. From 1.4.5 to ...
EPSS
5.5 Medium
CVSS3