FKIE_CVE-2026-26187
Vulnerability from fkie_nvd - Published: 2026-02-13 19:17 - Updated: 2026-02-18 21:32
Severity ?
Summary
lakeFS is an open-source tool that transforms object storage into a Git-like repositories. Prior to 1.77.0, the local block adapter (pkg/block/local/adapter.go) allows authenticated users to read and write files outside their designated storage boundaries. The verifyRelPath function used strings.HasPrefix() to verify that requested paths fall within the configured storage directory. This check was insufficient because it validated only the path prefix without requiring a path separator, allowing access to sibling directories with similar names. Also, the adapter verified that resolved paths stayed within the adapter's base path, but did not verify that object identifiers stayed within their designated storage namespace. This allowed attackers to use path traversal sequences in the object identifier to access files in other namespaces. Fixed in version v1.77.0.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lakefs:lakefs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A8EEB4-D5B5-419E-AFB3-DE354DB020F3",
"versionEndExcluding": "1.77.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "lakeFS is an open-source tool that transforms object storage into a Git-like repositories. Prior to 1.77.0, the local block adapter (pkg/block/local/adapter.go) allows authenticated users to read and write files outside their designated storage boundaries. The verifyRelPath function used strings.HasPrefix() to verify that requested paths fall within the configured storage directory. This check was insufficient because it validated only the path prefix without requiring a path separator, allowing access to sibling directories with similar names. Also, the adapter verified that resolved paths stayed within the adapter\u0027s base path, but did not verify that object identifiers stayed within their designated storage namespace. This allowed attackers to use path traversal sequences in the object identifier to access files in other namespaces. Fixed in version v1.77.0."
},
{
"lang": "es",
"value": "lakeFS es una herramienta de c\u00f3digo abierto que transforma el almacenamiento de objetos en repositorios similares a Git. Antes de la versi\u00f3n 1.77.0, el adaptador de bloque local (pkg/block/local/adapter.go) permit\u00eda a los usuarios autenticados leer y escribir archivos fuera de sus l\u00edmites de almacenamiento designados. La funci\u00f3n verifyRelPath utilizaba strings.HasPrefix() para verificar que las rutas solicitadas estuvieran dentro del directorio de almacenamiento configurado. Esta verificaci\u00f3n era insuficiente porque validaba solo el prefijo de la ruta sin requerir un separador de ruta, lo que permit\u00eda el acceso a directorios hermanos con nombres similares. Adem\u00e1s, el adaptador verificaba que las rutas resueltas permanecieran dentro de la ruta base del adaptador, pero no verificaba que los identificadores de objeto permanecieran dentro de su espacio de nombres de almacenamiento designado. Esto permit\u00eda a los atacantes utilizar secuencias de salto de ruta en el identificador de objeto para acceder a archivos en otros espacios de nombres. Corregido en la versi\u00f3n v1.77.0."
}
],
"id": "CVE-2026-26187",
"lastModified": "2026-02-18T21:32:15.033",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-02-13T19:17:29.100",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/treeverse/lakeFS/commit/cbc106275357302a834280f133265dc39f1384ce"
},
{
"source": "security-advisories@github.com",
"tags": [
"Product",
"Release Notes"
],
"url": "https://github.com/treeverse/lakeFS/releases/tag/v1.77.0"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://github.com/treeverse/lakeFS/security/advisories/GHSA-699m-4v95-rmpm"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…