The way that the hub code validates upload paths allows for an attacker to choose an arbitrary destination for the uploaded file. Uploading still requires login. However, an attacker with credentials could damage the integrity of the Koji system.
There is no known workaround. All Koji admins are encouraged to update to a fixed version as soon as possible.
Koji versions 1.14.3, 1.15.3, 1.16.3, 1.17.1, and 1.18.1 all include patches to solve this vulnerability.
{
"cwe_ids": [
"CWE-22"
],
"github_reviewed": true,
"nvd_published_at": "2019-10-09T22:15:00Z",
"severity": "HIGH",
"github_reviewed_at": "2024-04-29T09:53:43Z"
}