Skip to content

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Skytable

High
ohsayan published GHSA-2hj9-cxmc-m4g7 Aug 3, 2021

Package

Skytable

Affected versions

0.5.0

Patched versions

0.5.1

Description

Impact

This is a directory traversal attack enabling remotely connected clients to destroy and/or manipulate critical files on the host's file system. Whenever a remotely connected client uses the enhanced MKSNAP action by passing a second argument for the filename with directory traversal syntax, for example MKSNAP ../badsnap, the database server will destroy the file at location ../badsnap.snapshot if appropriate permissions aren't set for the process.

Patches

This security bug has been patched in v0.5.1

Workarounds

Restrict the permissions of the skyd process to its working directory.

References

For more information

If you have any questions or comments about this advisory:

Severity

High

CVE ID

CVE-2021-32814

Weaknesses

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Learn more on MITRE.

Credits