|
Message-ID: <CANwEksUQ7BUBm4gfK3Dew-_Mm1-nO=Dh4u1wwvZ7CV8VwP=Zvg@mail.gmail.com> Date: Wed, 6 Mar 2019 14:22:45 -0800 From: Neng Lu <freeneng@...il.com> To: windham.wong@...rmeye.io, Apache Security Team <security@...che.org>, oss-security@...ts.openwall.com, general@...ubator.apache.org, dev@...on.apache.org, private@...on.apache.org Subject: [CVE-2018-11789] Apache Incubator Heron file access vulnerability Severity: Important Vendor: The Apache Software Foundation Versions Affected: Heron 0.13.0 to 0.17.8 Description: When accessing the heron-ui webpage, people can modify the file paths outside of the current container to access any file on the host. Mitigation: All Heron users should upgrade to 0.20.0-incubating Example: modify the parameter path= to go to the directory you would like to view. i.e. ..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd Credit: This issue was discovered by Windham Wong of stormeye.io -- Best Regards, Neng
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.