Specific vulnerabilities:
resource_create
and package_update
actions, using the ResourceUploader
object. Also reachable via package_create
, package_revise
, and package_patch
via calls to package_update
.A user with permissions to create or edit a dataset can upload a resource with a specially crafted id to write the uploaded file in an arbitrary location. This can be leveraged to Remote Code Execution via Beaker's insecure pickle loading.
All the above listed vulnerabilities have been fixed in CKAN 2.9.9 and CKAN 2.10.1 The patches for CKAN 2.9 should apply easily to previous CKAN versions.
{ "nvd_published_at": "2023-05-26T23:15:18Z", "cwe_ids": [ "CWE-20" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-05-24T17:24:56Z" }