GHSA-M836-GXWQ-J2PM
Vulnerability from github – Published: 2021-10-28 16:27 – Updated: 2021-10-27 18:58
VLAI?
Summary
Improper Access Control in github.com/treeverse/lakefs
Details
Impact
- [medium] A user with write permissions to a portion of a repository may use the S3 gateway to copy any object in the repository if they know its name.
- [medium] A user with permission to write any one of tags, branches, or commits on a repository may write all of them.
- [low] A user with permission to read any one of tags, branches, or commits on a repository may read all of them.
- [low] A user allowed to list objects in a repository or read repository meta-data may retrieve graveler information about the location on underlying storage of all objects stored in any commit that they can view. If the user additionally has the capability to read underlying storage, they will be able to retrieve metadata associated with all objects in that commit.
For more information
If you have any questions or comments about this advisory please: * Email us at security@treeverse.io. * Open an issue on https://github.com/treeverse/lakeFS/issues/new.
Severity ?
5.7 (Medium)
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/treeverse/lakefs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.53.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-284"
],
"github_reviewed": true,
"github_reviewed_at": "2021-10-27T18:58:30Z",
"nvd_published_at": null,
"severity": "MODERATE"
},
"details": "### Impact\n\n1. [medium] A user with write permissions to a portion of a repository may use the S3 gateway to copy any object in the repository if they know its name.\n1. [medium] A user with permission to write any one of tags, branches, or commits on a repository may write all of them.\n1. [low] A user with permission to read any one of tags, branches, or commits on a repository may read all of them.\n1. [low] A user allowed to list objects in a repository _or_ read repository meta-data may retrieve graveler information about the location on underlying storage of all objects stored in any commit that they can view. If the user additionally has the capability to read underlying storage, they will be able to retrieve metadata associated with all objects in that commit.\n\n### For more information\n\nIf you have any questions or comments about this advisory please:\n* Email us at security@treeverse.io.\n* Open an issue on https://github.com/treeverse/lakeFS/issues/new.\n",
"id": "GHSA-m836-gxwq-j2pm",
"modified": "2021-10-27T18:58:30Z",
"published": "2021-10-28T16:27:03Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/treeverse/lakeFS/security/advisories/GHSA-m836-gxwq-j2pm"
},
{
"type": "WEB",
"url": "https://github.com/treeverse/lakeFS/commit/f2117281cadb14fdf9ac7fe287f84d5c10308b88"
},
{
"type": "PACKAGE",
"url": "https://github.com/treeverse/lakeFS"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "Improper Access Control in github.com/treeverse/lakefs"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…