Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1wZjV2LXBxZnYteDhqas4ABAQZ
OpenCanary Executes Commands From Potentially Writable Config File
Impact
OpenCanary directly executed commands taken from its config file. Where the config file is stored in an unprivileged user directory but the daemon is executed by root, it’s possible for the unprivileged user to change the config file and escalate permissions when root later runs the daemon.
Thanks to the folks at Whirlylabs for finding and fixing this.
Patches
Upgrade to 0.9.4 or higher.
Permalink: https://github.com/advisories/GHSA-pf5v-pqfv-x8jjJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wZjV2LXBxZnYteDhqas4ABAQZ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 1 day ago
Updated: about 18 hours ago
Identifiers: GHSA-pf5v-pqfv-x8jj, CVE-2024-48911
References:
- https://github.com/thinkst/opencanary/security/advisories/GHSA-pf5v-pqfv-x8jj
- https://github.com/thinkst/opencanary/commit/2c11575b1a3dd8b0df26a879ba856c0aa350c049
- https://github.com/thinkst/opencanary/releases/tag/v0.9.4
- https://nvd.nist.gov/vuln/detail/CVE-2024-48911
- https://github.com/advisories/GHSA-pf5v-pqfv-x8jj
Blast Radius: 0.0
Affected Packages
pypi:OpenCanary
Dependent packages: 0Dependent repositories: 2
Downloads: 2,256 last month
Affected Version Ranges: < 0.9.4
Fixed in: 0.9.4
All affected versions: 0.3.1, 0.3.2, 0.5.1, 0.5.2, 0.5.4, 0.5.5, 0.5.6, 0.5.7, 0.5.8, 0.6.0, 0.6.1, 0.6.2, 0.6.3, 0.7.0, 0.7.1, 0.9.0, 0.9.1, 0.9.2, 0.9.3
All unaffected versions: 0.9.4