CVE-2025-58158

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-58158
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-58158.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-58158
Aliases
Downstream
Related
Published
2025-08-29T18:15:42Z
Modified
2025-09-24T12:44:02.976108Z
Summary
[none]
Details

Harness Open Source is an end-to-end developer platform with Source Control Management, CI/CD Pipelines, Hosted Developer Environments, and Artifact Registries. Prior to version 3.3.0, Open Source Harness git LFS server (Gitness) exposes api to retrieve and upload files via git LFS. Implementation of upload git LFS file api is vulnerable to arbitrary file write. Due to improper sanitization for upload path, a malicious authenticated user who has access to Harness Gitness server api can use a crafted upload request to write arbitrary file to any location on file system, may even compromise the server. Users using git LFS are vulnerable. This issue has been patched in version 3.3.0.

References

Affected packages

Git / github.com/harness/harness

Affected ranges

Type
GIT
Repo
https://github.com/harness/harness
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

unstabledemo

v1.*

v1.0.0-gitspaces-beta
v1.0.1-gitspaces-beta
v1.0.2-gitspaces-beta
v1.0.3-gitspaces-beta
v1.0.4-gitspaces-beta

v3.*

v3.0.0
v3.0.0-beta.1
v3.0.0-beta.10
v3.0.0-beta.2
v3.0.0-beta.3
v3.0.0-beta.4
v3.0.0-beta.5
v3.0.0-beta.6
v3.0.0-beta.7
v3.0.0-beta.8
v3.0.0-beta.9
v3.2.0