GHSA-4w8f-hjm9-xwgf

Source
https://github.com/advisories/GHSA-4w8f-hjm9-xwgf
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-4w8f-hjm9-xwgf/GHSA-4w8f-hjm9-xwgf.json
Aliases
Published
2022-06-06T21:24:24Z
Modified
2023-11-08T04:08:38.371661Z
Details

Impact

It was possible to traverse the entire AWS S3 bucket and in most cases to access or delete files. The issue was discovered by the maintainer. There were no reports of the vulnerability being known to or exploited by a third party, before the release of the patch.

If the AWS_LOCATION setting was set, traversal was limited to that location only. If all your files handling views (like form views) require authentication or special permission, the thread is limited to privileged users.

Patches

The vulnerability has been fixed in version 5.5.1 and above.

Workarounds

There is no feasible workaround. We must urge all users to immediately updated to a patched version.

Detailed attack vector description

An attacker may use a request with malicious form data to traverse the entire AWS S3 bucket and perform destructive operations.

An attack could look as follows:

curl -X POST -F "s3file=file" -F "file=/priviliged/location/secrets.txt" https://www.example.com/any/path/will/work/

This will result in a request with files set and opened:

>>> request.FILES.getlist("file")
[File("/priviliged/location/secrets.txt")]

Since this behavior is injected via a middleware, any view can be called this way and will carry any files defined by the attacker.

Via the s3file form field, any input name can be specified, including multiple inputs. For each input, multiple files can be freely picked of the S3 bucket.

Scenarios and their practicality

There are four scenarios that would be considered practical in most setups:

  1. Illegal file injection,
  2. file deletion,
  3. file retrieval & tree traversal.
  4. code injection & remote code execution.
File deletion

An attacker knows the location of a privileged file, like a static asset. Next, the file is injected into a form view. The upload to function will move the file to a new location. This is effectively deleting the file, since the previous references to it are invalid, and will cause S3 to return a 404. Furthermore, the new location is unknown to the site operator.

File retrieval & tree traversal

An attacker knows the URL of a secret file and injects it into a form view. The view will move the file to a public location, making it accessible to the attacker. Since most form views will not be rate limited, this could also be used to guess files and traverse the file tree.

Illegal file injection

An attacker uses any form to upload a file to the temporary upload location. Next, the attacker injects that file into a request, does not validate the contents or is not equipped to handle the mime type. The latter could be used as a potential DOS vector.

In practice, this is not a practical risk in most hardened setup. Files should always be sanitized before processing, since files can be included in a request even without this security issues.

For more information

If you have any questions or comments about this advisory: * Open an issue on GitHub * Email us at johannes@maron.family

References

Affected packages

PyPI / django-s3file

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
5.5.1

Affected versions

0.*

0.1.0
0.1.1
0.1.2
0.1.3
0.1.4
0.1.5
0.1.6
0.1.7
0.1.8
0.1.9
0.1.10
0.1.11
0.1.12
0.1.13
0.1.14
0.1.15
0.1.16
0.1.17
0.1.18
0.1.19
0.1.20
0.1.21
0.1.22
0.1.23
0.2.0
0.3.0
0.3.1
0.3.2
0.3.3
0.3.4
0.3.5
0.3.6
0.3.7
0.4.0
0.4.1
0.5.0
0.5.1
0.5.2
0.5.3
0.5.4
0.6.0
0.6.1
0.6.2

1.*

1.0.0
1.0.1
1.0.2
1.1.0
1.2.0
1.2.1

2.*

2.0.0

3.*

3.0.0
3.0.1
3.0.2
3.0.3
3.0.4
3.0.5

4.*

4.0.0
4.0.1
4.0.2
4.1.0
4.2.0

5.*

5.0.0
5.0.1
5.0.2
5.0.4
5.0.5
5.0.6
5.1.0
5.1.1
5.1.2
5.1.3
5.2.0
5.3.0
5.4.0
5.5.0

Ecosystem specific

{
    "affected_functions": [
        "s3file.forms.S3FileInputMixin",
        "s3file.forms.S3FileInputMixin.build_attrs",
        "s3file.middleware.S3FileMiddleware.__call__",
        "s3file.middleware.S3FileMiddleware.get_files_from_storage"
    ]
}