Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS05aDZoLTlnNzgtODZmN84AAwpm

Yapscan's report receiver server vulnerable to path traversal and log injection

Impact

If you make use of the report receiver server (experimental), a client may be able to forge requests such that arbitrary files on the host can be overwritten (subject to permissions of the yapscan server), leading to loss of data. This is particularly problematic if you do not authenticate clients and/or run the server with elevated permissions.

Patches

Vulnerable versions:

This problem is patched in version v0.19.1

Workarounds

Update to the newer version is highly encouraged!

Measures to reduce the risk of this include authenticating clients (see --client-ca flag) and containerization of the yapscan server.

References

The tracking issue is #35. There you can find the commits, fixing the issue.

Permalink: https://github.com/advisories/GHSA-9h6h-9g78-86f7
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS05aDZoLTlnNzgtODZmN84AAwpm
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 year ago
Updated: 12 months ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Identifiers: GHSA-9h6h-9g78-86f7
References: Repository: https://github.com/fkie-cad/yapscan

Affected Packages

go:github.com/fkie-cad/yapscan
Dependent packages: 0
Dependent repositories: 0
Downloads:
Affected Version Ranges: >= 0.18.0, < 0.19.1
Fixed in: 0.19.1
All affected versions: 0.18.0, 0.19.0
All unaffected versions: 0.1.0, 0.2.0, 0.3.0, 0.4.0, 0.5.0, 0.6.0, 0.7.0, 0.7.1, 0.8.0, 0.9.0, 0.10.0, 0.11.0, 0.12.0, 0.13.0, 0.14.0, 0.15.0, 0.16.0, 0.17.0, 0.19.1, 0.19.2, 0.19.3