Skip to content

Velociraptor subject to Path Traversal

Moderate severity GitHub Reviewed Published Jan 19, 2023 to the GitHub Advisory Database • Updated Mar 30, 2023

Package

gomod www.velocidex.com/golang/velociraptor (Go)

Affected versions

< 0.6.7-5

Patched versions

0.6.7-5

Description

Rapid7 Velociraptor did not properly sanitize the client ID parameter to the CreateCollection API, allowing a directory traversal in where the collection task could be written. It was possible to provide a client id of "../clients/server" to schedule the collection for the server (as a server artifact), but only require privileges to schedule collections on the client. Normally, to schedule an artifact on the server, the COLLECT_SERVER permission is required. This permission is normally only granted to "administrator" role. Due to this issue, it is sufficient to have the COLLECT_CLIENT privilege, which is normally granted to the "investigator" role. To exploit this vulnerability, the attacker must already have a Velociraptor user account at least "investigator" level, and be able to authenticate to the GUI and issue an API call to the backend. Typically, most users deploy Velociraptor with limited access to a trusted group, and most users will already be administrators within the GUI. This issue affects Velociraptor versions before 0.6.7-5. Version 0.6.7-5, released January 16, 2023, fixes the issue.

References

Published by the National Vulnerability Database Jan 18, 2023
Published to the GitHub Advisory Database Jan 19, 2023
Reviewed Feb 1, 2023
Last updated Mar 30, 2023

Severity

Moderate
4.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Weaknesses

CVE ID

CVE-2023-0290

GHSA ID

GHSA-7jf5-fvgf-48c6

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.