Date: Fri, 04 Nov 2022 12:09:52 +0100 From: Stefan Bodewig <bodewig@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2022-37866: Apache Ivy: Ivy Path traversal -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Severity: medium Description: When Apache Ivy downloads artifacts from a repository it stores them in the local file system based on a user-supplied "pattern" that may include placeholders for artifacts coordinates like the organisation, module or version. If said coordinates contain "../" sequences - which are valid characters for Ivy coordinates in general - it is possible the artifacts are stored outside of Ivy's local cache or repository or can overwrite different artifacts inside of the local cache. In order to exploit this vulnerability an attacker needs collaboration by the remote repository as Ivy will issue http requests containing ".." sequences and a "normal" repository will not interpret them as part of the artifact coordinates. Mitigation: Users of Apache Ivy 2.0.0 to 2.5.1 should upgrade to Ivy 2.5.1. Credit: This issue was discovered by Kostya Kortchinsky of the Databricks Security Team. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAmNk8wAACgkQohFa4V9ri3IUCgCeNrT2fqxtV4aAJf/RhpmQLeDK VkAAoLmKEXe0H6Oe6cgWiyxvOM7HpZYd =mSlx -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.