CVE-2021-39143
Path Traversal in spinnaker
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Spinnaker is an open source, multi-cloud continuous delivery platform. A path traversal vulnerability was discovered in uses of TAR files by AppEngine for deployments. This uses a utility to extract files locally for deployment without validating the paths in that deployment don't override system files. This would allow an attacker to override files on the container, POTENTIALLY introducing a MITM type attack vector by replacing libraries or injecting wrapper files. Users are advised to update as soon as possible. For users unable to update disable Google AppEngine deployments and/or disable artifacts that provide TARs.
Spinnaker es una plataforma de entrega continua multi-nube de código abierto. Se ha detectado una vulnerabilidad de salto de ruta en el uso de archivos TAR por parte de AppEngine para los despliegues. Esto usa una utilidad para extraer archivos localmente para el despliegue sin comprender las rutas en ese despliegue no anulan los archivos del sistema. Esto permitiría a un atacante anular archivos en el contenedor, introduciendo POTENCIALMENTE un vector de ataque de tipo MITM mediante la sustitución de bibliotecas o la inyección de archivos wrapper. Se recomienda a usuarios que actualicen lo antes posible. Para los usuarios que no puedan actualizar, deshabiliten los despliegues de Google AppEngine y/o deshabiliten los artefactos que proporcionan TARs
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-08-16 CVE Reserved
- 2022-01-04 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/spinnaker/spinnaker/security/advisories/GHSA-34jx-3vmr-56v8 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linuxfoundation Search vendor "Linuxfoundation" | Spinnaker Search vendor "Linuxfoundation" for product "Spinnaker" | < 1.24.7 Search vendor "Linuxfoundation" for product "Spinnaker" and version " < 1.24.7" | - |
Affected
| ||||||
Linuxfoundation Search vendor "Linuxfoundation" | Spinnaker Search vendor "Linuxfoundation" for product "Spinnaker" | >= 1.25.0 < 1.25.7 Search vendor "Linuxfoundation" for product "Spinnaker" and version " >= 1.25.0 < 1.25.7" | - |
Affected
| ||||||
Linuxfoundation Search vendor "Linuxfoundation" | Spinnaker Search vendor "Linuxfoundation" for product "Spinnaker" | >= 1.26.0 < 1.26.7 Search vendor "Linuxfoundation" for product "Spinnaker" and version " >= 1.26.0 < 1.26.7" | - |
Affected
|