You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in spinnaker
Moderate
jasonmcintosh
published
GHSA-34jx-3vmr-56v8Jan 3, 2022
Package
spinnaker
Affected versions
<1.26.7, <1.25.7, <1.24.7
Patched versions
1.26.7, 1.25.7, 1.24.7
Description
Impact
A path traversal vulnerability was discovered in uses of TAR files by AppEngine for deployments. This uses a utility to extract files locally for deployment without validating the paths in that deployment don't override system files. This would allow an attacker to override files on the container, POTENTIALLY introducing a MITM type attack vector by replacing libraries or injecting wrapper files.
Patches
Incoming...
Workarounds
Disable Google AppEngine deployments and/or disable artifacts that provide TARs.
Impact
A path traversal vulnerability was discovered in uses of TAR files by AppEngine for deployments. This uses a utility to extract files locally for deployment without validating the paths in that deployment don't override system files. This would allow an attacker to override files on the container, POTENTIALLY introducing a MITM type attack vector by replacing libraries or injecting wrapper files.
Patches
Incoming...
Workarounds
Disable Google AppEngine deployments and/or disable artifacts that provide TARs.
References
To be updated. Reference examples:
https://bugzilla.redhat.com/show_bug.cgi?id=1584388
Code area (as of release 1.26):
https://github.com/spinnaker/clouddriver/blob/release-1.26.x/clouddriver-appengine/src/main/java/com/netflix/spinnaker/clouddriver/appengine/artifacts/ArtifactUtils.java
For more information
Email security@spinnaker.io