Arbitrary filepath traversal via URI injection
Description
Reviewed
Nov 10, 2021
Published to the GitHub Advisory Database
Nov 10, 2021
Published by the National Vulnerability Database
Nov 11, 2021
Last updated
Jan 23, 2024
OctoRPKI does not escape a URI with a filename containing "..", this allows a repository to create a file, (ex.
rsync://example.org/repo/../../etc/cron.daily/evil.roa
), which would then be written to disk outside the base cache folder. This could allow for remote code execution on the host machine OctoRPKI is running on.Patches
For more information
If you have any questions or comments about this advisory email us at [email protected]
References