Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS01NXI5LTVteDktcXE3cs4AA9ul
Cache driver GetBlob() allows read access to any blob without access control check
Summary
Cache driver GetBlob()
allows read access to any blob without access control check
Details
If a Zot accessControl
policy allows users read access to some repositories but restricts read access to other repositories and dedupe
is enabled (it is enabled by default), then an attacker who knows the name of an image and the digest of a blob (that they do not have read access to), they may maliciously read it via a second repository they do have read access to. This allows an attacker to read an image that the accessControl
policy denies.
This attack is possible because ImageStore.CheckBlob()
calls checkCacheBlob()
to find the blob a global cache by searching for the digest. If it is found, it is copied to the user requested repository with copyBlob()
.
This cache behavior is intentionally used in RouteHandler.CreateBlobUpload()
to implement cross repository blob mount (POST /v2/<name>/blobs/uploads/?mount=<digest>&from=<repository name>
) in Zot. This is still missing an access control to check read access on the source repository.
This cache behavior is unexpectedly also used in RouteHandler.CheckBlob()
too for HEAD /v2/<name>/blobs/<digest>
. If a blob is requested that does not exist on the requested repository, Zot will search for it in a global cache (possibly returning a result from an from an incorrect repository) and then will store it into the ImageStore
for the requested repository.
RouteHandler.GetBlob()
does not call ImageStore.CheckBlob()
so it is not directly vulnerable. However an attacker with only limited read access may first call CheckBlob()
to fetch the blob from the cache, then call GetBlob()
to read the blob.
Mitigation
The attack may be mitigated by configuring "dedupe": false
in the "storage"
settings. This disables Zot's cache drivers. dedupe
is enabled by default using the BoltDB cache driver.
Impact
An attacker can read images that the accessControl
policy denies if they have read access to any other second repository.
This attack only allows accessing blobs (both config and layers) by digest. Manifests cannot be accessed.
This attack requires the attacker to know the name of a private image and its layer digests. A scenario where this might happen is if a project has public CI build logs but publishes the image to a private repository. Many image build tools log layer digests.
Permalink: https://github.com/advisories/GHSA-55r9-5mx9-qq7rJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01NXI5LTVteDktcXE3cs4AA9ul
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 5 months ago
Updated: 4 months ago
CVSS Score: 4.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-55r9-5mx9-qq7r, CVE-2024-39897
References:
- https://github.com/project-zot/zot/security/advisories/GHSA-55r9-5mx9-qq7r
- https://github.com/project-zot/zot/commit/aaee0220e46bdadd12115ac67c19f9d3153eb1df
- https://nvd.nist.gov/vuln/detail/CVE-2024-39897
- https://github.com/advisories/GHSA-55r9-5mx9-qq7r
Blast Radius: 1.0
Affected Packages
go:zotregistry.dev/zot
Dependent packages: 0Dependent repositories: 0
Downloads:
Affected Version Ranges: < 2.1.0
Fixed in: 2.1.0
All affected versions: 0.2.6, 0.2.7, 0.2.8, 0.2.9, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 0.3.4, 0.3.5, 0.3.6, 0.3.7, 0.3.8, 0.3.9, 0.3.10, 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 1.1.6, 1.1.7, 1.1.8, 1.1.9, 1.1.10, 1.1.11, 1.1.12, 1.1.13, 1.1.14, 1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.2.7, 1.2.8, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.3.5, 1.3.6, 1.3.7, 1.3.8, 1.3.9, 1.4.0, 1.4.1, 1.4.2, 1.4.3
All unaffected versions:
go:zotregistry.io/zot
Dependent packages: 0Dependent repositories: 0
Downloads:
Affected Version Ranges: < 2.1.0
Fixed in: 2.1.0
All affected versions: 0.2.6, 0.2.7, 0.2.8, 0.2.9, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 0.3.4, 0.3.5, 0.3.6, 0.3.7, 0.3.8, 0.3.9, 0.3.10, 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 1.1.6, 1.1.7, 1.1.8, 1.1.9, 1.1.10, 1.1.11, 1.1.12, 1.1.13, 1.1.14, 1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.2.7, 1.2.8, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.3.5, 1.3.6, 1.3.7, 1.3.8, 1.3.9, 1.4.0, 1.4.1, 1.4.2, 1.4.3
All unaffected versions: