GHSA-hmq4-c2r4-5q8h

Suggest an improvement
Source
https://github.com/advisories/GHSA-hmq4-c2r4-5q8h
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-hmq4-c2r4-5q8h/GHSA-hmq4-c2r4-5q8h.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-hmq4-c2r4-5q8h
Aliases
Related
Published
2023-10-19T17:06:42Z
Modified
2024-08-21T14:57:05.409305Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Artifact Hub arbitrary file read vulnerability
Details

Impact

During a security audit of Artifact Hub's code base, a security researcher at OffSec identified a bug in which by using symbolic links in certain kinds of repositories loaded into Artifact Hub, it was possible to read internal files.

Artifact Hub indexes content from a variety of sources, including git repositories. When processing git based repositories, Artifact Hub clones the repository and, depending on the artifact kind, reads some files from it. During this process, in some cases, no validation was done to check if the file was a symbolic link. This made possible to read arbitrary files in the system, potentially leaking sensitive information.

Patches

This issue has been resolved in version 1.16.0.

Database specific
{
    "nvd_published_at": "2023-10-19T21:15:09Z",
    "cwe_ids": [
        "CWE-22"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-10-19T17:06:42Z"
}
References

Affected packages

Go / github.com/artifacthub/hub

Package

Name
github.com/artifacthub/hub
View open source insights on deps.dev
Purl
pkg:golang/github.com/artifacthub/hub

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.16.0