Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 04 Nov 2022 12:09:52 +0100
From: Stefan Bodewig <bodewig@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2022-37866: Apache Ivy: Ivy Path traversal

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Severity: medium

Description:

When Apache Ivy downloads artifacts from a repository it stores them in
the local file system based on a user-supplied "pattern" that may
include placeholders for artifacts coordinates like the organisation,
module or version.

If said coordinates contain "../" sequences - which are valid characters
for Ivy coordinates in general - it is possible the artifacts are stored
outside of Ivy's local cache or repository or can overwrite different
artifacts inside of the local cache.

In order to exploit this vulnerability an attacker needs collaboration
by the remote repository as Ivy will issue http requests containing ".."
sequences and a "normal" repository will not interpret them as part of
the artifact coordinates.

Mitigation:

Users of Apache Ivy 2.0.0 to 2.5.1 should upgrade to Ivy 2.5.1.

Credit:

This issue was discovered by Kostya Kortchinsky of the Databricks Security Team.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAmNk8wAACgkQohFa4V9ri3IUCgCeNrT2fqxtV4aAJf/RhpmQLeDK
VkAAoLmKEXe0H6Oe6cgWiyxvOM7HpZYd
=mSlx
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.