gsd-2021-21272
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a "zip-slip" vulnerability. The directory support feature allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on the host filesystem outside of the user-specified directory unexpectedly with the same permissions as the user who runs `oras pull`. Users of the affected versions are impacted if they are `oras` CLI users who runs `oras pull`, or if they are Go programs, which invoke `github.com/deislabs/oras/pkg/content.FileStore`. The problem has been fixed in version 0.9.0. For `oras` CLI users, there is no workarounds other than pulling from a trusted artifact provider. For `oras` package users, the workaround is to not use `github.com/deislabs/oras/pkg/content.FileStore`, and use other content stores instead, or pull from a trusted artifact provider.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-21272", "description": "ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a \"zip-slip\" vulnerability. The directory support feature allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on the host filesystem outside of the user-specified directory unexpectedly with the same permissions as the user who runs `oras pull`. Users of the affected versions are impacted if they are `oras` CLI users who runs `oras pull`, or if they are Go programs, which invoke `github.com/deislabs/oras/pkg/content.FileStore`. The problem has been fixed in version 0.9.0. For `oras` CLI users, there is no workarounds other than pulling from a trusted artifact provider. For `oras` package users, the workaround is to not use `github.com/deislabs/oras/pkg/content.FileStore`, and use other content stores instead, or pull from a trusted artifact provider.", "id": "GSD-2021-21272", "references": [ "https://www.suse.com/security/cve/CVE-2021-21272.html", "https://access.redhat.com/errata/RHSA-2021:3016" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-21272" ], "details": "ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a \"zip-slip\" vulnerability. The directory support feature allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on the host filesystem outside of the user-specified directory unexpectedly with the same permissions as the user who runs `oras pull`. Users of the affected versions are impacted if they are `oras` CLI users who runs `oras pull`, or if they are Go programs, which invoke `github.com/deislabs/oras/pkg/content.FileStore`. The problem has been fixed in version 0.9.0. For `oras` CLI users, there is no workarounds other than pulling from a trusted artifact provider. For `oras` package users, the workaround is to not use `github.com/deislabs/oras/pkg/content.FileStore`, and use other content stores instead, or pull from a trusted artifact provider.", "id": "GSD-2021-21272", "modified": "2023-12-13T01:23:11.274609Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21272", "STATE": "PUBLIC", "TITLE": "zip slip in ORAS" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "oras", "version": { "version_data": [ { "version_value": "\u003e= 0.4.0, \u003c 0.9.0" } ] } } ] }, "vendor_name": "deislabs" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a \"zip-slip\" vulnerability. The directory support feature allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on the host filesystem outside of the user-specified directory unexpectedly with the same permissions as the user who runs `oras pull`. Users of the affected versions are impacted if they are `oras` CLI users who runs `oras pull`, or if they are Go programs, which invoke `github.com/deislabs/oras/pkg/content.FileStore`. The problem has been fixed in version 0.9.0. For `oras` CLI users, there is no workarounds other than pulling from a trusted artifact provider. For `oras` package users, the workaround is to not use `github.com/deislabs/oras/pkg/content.FileStore`, and use other content stores instead, or pull from a trusted artifact provider." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/deislabs/oras/security/advisories/GHSA-g5v4-5x39-vwhx", "refsource": "CONFIRM", "url": "https://github.com/deislabs/oras/security/advisories/GHSA-g5v4-5x39-vwhx" }, { "name": "https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e", "refsource": "MISC", "url": "https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e" }, { "name": "https://github.com/deislabs/oras/releases/tag/v0.9.0", "refsource": "MISC", "url": "https://github.com/deislabs/oras/releases/tag/v0.9.0" }, { "name": "https://pkg.go.dev/github.com/deislabs/oras/pkg/oras", "refsource": "MISC", "url": "https://pkg.go.dev/github.com/deislabs/oras/pkg/oras" } ] }, "source": { "advisory": "GHSA-g5v4-5x39-vwhx", "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003cv0.9.0", "affected_versions": "All versions before 0.9.0", "cvss_v2": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-22", "CWE-937" ], "date": "2022-02-15", "description": "ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS suffers from a `zip-slip` vulnerability. The directory support feature allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on the host filesystem outside of the user-specified directory unexpectedly with the same permissions as the user who runs `oras pull`.", "fixed_versions": [ "v0.9.0" ], "identifier": "CVE-2021-21272", "identifiers": [ "GHSA-g5v4-5x39-vwhx", "CVE-2021-21272" ], "not_impacted": "All versions starting from 0.9.0", "package_slug": "go/github.com/deislabs/oras", "pubdate": "2022-02-15", "solution": "Upgrade to version 0.9.0 or above.", "title": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "urls": [ "https://github.com/deislabs/oras/security/advisories/GHSA-g5v4-5x39-vwhx", "https://nvd.nist.gov/vuln/detail/CVE-2021-21272", "https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e", "https://github.com/deislabs/oras/releases/tag/v0.9.0", "https://pkg.go.dev/github.com/deislabs/oras/pkg/oras", "https://github.com/advisories/GHSA-g5v4-5x39-vwhx" ], "uuid": "372f90ae-00e7-4cb8-ba24-ec8285b238de", "versions": [ { "commit": { "sha": "96cd90423303f1bb42bd043cb4c36085e6e91e8e", "tags": [ "v0.9.0" ], "timestamp": "20210122152641" }, "number": "v0.9.0" } ] }, { "affected_range": "\u003cv0.9.0", "affected_versions": "All versions before 0.9.0", "cvss_v2": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-59", "CWE-937" ], "date": "2023-02-07", "description": "ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a \"zip-slip\" vulnerability. The directory support feature allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on the host filesystem outside of the user-specified directory unexpectedly with the same permissions as the user who runs `oras pull`. Users of the affected versions are impacted if they are `oras` CLI users who runs `oras pull`, or if they are Go programs, which invoke `github.com/deislabs/oras/pkg/content.FileStore`. The problem has been fixed in version 0.9.0. For `oras` CLI users, there is no workarounds other than pulling from a trusted artifact provider. For `oras` package users, the workaround is to not use `github.com/deislabs/oras/pkg/content.FileStore`, and use other content stores instead, or pull from a trusted artifact provider.", "fixed_versions": [ "v0.9.0" ], "identifier": "CVE-2021-21272", "identifiers": [ "GHSA-g5v4-5x39-vwhx", "CVE-2021-21272" ], "not_impacted": "All versions starting from 0.9.0", "package_slug": "go/github.com/deislabs/oras/pkg/content", "pubdate": "2022-02-15", "solution": "Upgrade to version 0.9.0 or above.", "title": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "urls": [ "https://github.com/deislabs/oras/security/advisories/GHSA-g5v4-5x39-vwhx", "https://nvd.nist.gov/vuln/detail/CVE-2021-21272", "https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e", "https://github.com/deislabs/oras/releases/tag/v0.9.0", "https://pkg.go.dev/github.com/deislabs/oras/pkg/oras", "https://pkg.go.dev/vuln/GO-2021-0099", "https://github.com/advisories/GHSA-g5v4-5x39-vwhx" ], "uuid": "d6d369f8-df8d-41a0-ad17-41d073bfe2e9", "versions": [ { "commit": { "sha": "96cd90423303f1bb42bd043cb4c36085e6e91e8e", "tags": [ "v0.9.0" ], "timestamp": "20210122152641" }, "number": "v0.9.0" } ] }, { "affected_range": "\u003e=v0.4.0 \u003cv0.9.0", "affected_versions": "All versions starting from 0.4.0 before 0.9.0", "cvss_v2": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-59", "CWE-937" ], "date": "2022-10-25", "description": "ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries.For `oras` CLI users, there is no workarounds other than pulling from a trusted artifact provider. For `oras` package users, the workaround is to not use `github.com/deislabs/oras/pkg/content.FileStore`, and use other content stores instead, or pull from a trusted artifact provider.", "fixed_versions": [ "v0.9.0" ], "identifier": "CVE-2021-21272", "identifiers": [ "CVE-2021-21272", "GHSA-g5v4-5x39-vwhx" ], "not_impacted": "All versions before 0.4.0, all versions starting from 0.9.0", "package_slug": "go/github.com/deislabs/oras/pkg/oras", "pubdate": "2021-01-25", "solution": "Upgrade to version 0.9.0 or above.", "title": "Path Traversal", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-21272" ], "uuid": "9078f635-6641-4f98-b288-0bc1acd26670", "versions": [ { "commit": { "sha": "daecb6fb4acd5194059994e6f4bd367ad00b3b76", "tags": [ "v0.4.0" ], "timestamp": "20190419173700" }, "number": "v0.4.0" }, { "commit": { "sha": "96cd90423303f1bb42bd043cb4c36085e6e91e8e", "tags": [ "v0.9.0" ], "timestamp": "20210122152641" }, "number": "v0.9.0" } ] } ] }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:deislabs:oras:*:*:*:*:*:*:*:*", "matchCriteriaId": "93510360-3674-4A55-9BB0-5FA39B53B970", "versionEndExcluding": "0.9.0", "versionStartIncluding": "0.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a \"zip-slip\" vulnerability. The directory support feature allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on the host filesystem outside of the user-specified directory unexpectedly with the same permissions as the user who runs `oras pull`. Users of the affected versions are impacted if they are `oras` CLI users who runs `oras pull`, or if they are Go programs, which invoke `github.com/deislabs/oras/pkg/content.FileStore`. The problem has been fixed in version 0.9.0. For `oras` CLI users, there is no workarounds other than pulling from a trusted artifact provider. For `oras` package users, the workaround is to not use `github.com/deislabs/oras/pkg/content.FileStore`, and use other content stores instead, or pull from a trusted artifact provider." }, { "lang": "es", "value": "ORAS es un software de c\u00f3digo abierto que permite una forma de empujar artefactos OCI a registros conformes con OCI. ORAS es tanto un CLI para pruebas iniciales como un m\u00f3dulo Go. En ORAS a partir de la versi\u00f3n 0.4.0 y anterior a la versi\u00f3n 0.9.0, existe una vulnerabilidad de \"deslizamiento de zip\". La funci\u00f3n de soporte de directorios permite que los tarballs gzipped descargados se extraigan autom\u00e1ticamente al directorio especificado por el usuario, donde el tarball puede tener enlaces simb\u00f3licos y enlaces duros. Un tarball o tarballs bien elaborados permiten a los proveedores de artefactos maliciosos enlazar, escribir o sobrescribir archivos espec\u00edficos en el sistema de archivos del host fuera del directorio especificado por el usuario de forma inesperada con los mismos permisos que el usuario que ejecuta `oras pull`. Los usuarios de las versiones afectadas se ven afectados si son usuarios de `oras` CLI que ejecutan `oras pull`, o si son programas Go, que invocan `github.com/deislabs/oras/pkg/content.FileStore`. El problema ha sido corregido en la versi\u00f3n 0.9.0. Para los usuarios de la CLI de `oras`, no hay ninguna soluci\u00f3n que no sea la de extraer de un proveedor de artefactos de confianza. Para los usuarios del paquete `oras`, la soluci\u00f3n es no utilizar `github.com/deislabs/oras/pkg/content.FileStore`, y utilizar otros almacenes de contenido en su lugar, o tirar de un proveedor de artefactos de confianza" } ], "id": "CVE-2021-21272", "lastModified": "2024-02-21T20:39:19.723", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2021-01-25T19:15:12.847", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/deislabs/oras/releases/tag/v0.9.0" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/deislabs/oras/security/advisories/GHSA-g5v4-5x39-vwhx" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://pkg.go.dev/github.com/deislabs/oras/pkg/oras" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "security-advisories@github.com", "type": "Secondary" } ] } } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.