Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1wZjV2LXBxZnYteDhqas4ABAQZ

OpenCanary Executes Commands From Potentially Writable Config File

Impact

OpenCanary directly executed commands taken from its config file. Where the config file is stored in an unprivileged user directory but the daemon is executed by root, it’s possible for the unprivileged user to change the config file and escalate permissions when root later runs the daemon.

Thanks to the folks at Whirlylabs for finding and fixing this.

Patches

Upgrade to 0.9.4 or higher.

Permalink: https://github.com/advisories/GHSA-pf5v-pqfv-x8jj
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wZjV2LXBxZnYteDhqas4ABAQZ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 1 day ago
Updated: about 18 hours ago


Identifiers: GHSA-pf5v-pqfv-x8jj, CVE-2024-48911
References: Repository: https://github.com/thinkst/opencanary
Blast Radius: 0.0

Affected Packages

pypi:OpenCanary
Dependent packages: 0
Dependent repositories: 2
Downloads: 2,256 last month
Affected Version Ranges: < 0.9.4
Fixed in: 0.9.4
All affected versions: 0.3.1, 0.3.2, 0.5.1, 0.5.2, 0.5.4, 0.5.5, 0.5.6, 0.5.7, 0.5.8, 0.6.0, 0.6.1, 0.6.2, 0.6.3, 0.7.0, 0.7.1, 0.9.0, 0.9.1, 0.9.2, 0.9.3
All unaffected versions: 0.9.4