GHSA-fv2p-qj5p-wqq4

Suggest an improvement
Source
https://github.com/advisories/GHSA-fv2p-qj5p-wqq4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-fv2p-qj5p-wqq4/GHSA-fv2p-qj5p-wqq4.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-fv2p-qj5p-wqq4
Published
2025-07-03T14:18:04Z
Modified
2025-07-03T14:18:04Z
Severity
  • 8.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L CVSS Calculator
Summary
LF Edge eKuiper vulnerable to File Path Traversal leading to file replacement
Details

Summary

Path traversal is also known as directory traversal. These vulnerabilities enable an attacker to read arbitrary files on the server that is running an application. In this case, an attacker might be able to write to arbitrary files on the server, allowing them to modify application data or behavior, and ultimately take full control of the server.

Details

The file handler function trusts the filename provided by the user. This includes the cases when the user uses a path instead of the filename. This makes possible to write arbitrary files to the system and replace the files owned by kuiper user on the filesystem. The vulnerable function is fileUploadHandler which is shown below:

https://github.com/lf-edge/ekuiper/blob/1e6b6b6601445eb05316532f5fbef7f0a863ecfe/internal/server/rest.go#L329-L359

Exploitation of this vulnerability allows an attacker to rewrite the files owned by ekuiper including the main kuiper binaries as they are owned by kuiper user:

kuiper binaries

PoC

  1. The files should be uploaded to /kuiper/data/uploads directory. So let's move to the /kuiper/data, examine the existing files and create an empty traversal-poc file owned by kuiper:

Preparation

  1. Now, we can go to Services > Configuration > File Management and try to upload file with name ../test:

GUI

Request in Burp

In the response we can see the path of the uploaded file and can assume that the traversal worked.

  1. Now we can try to change the traversal-poc file that we know exists on the server. It can be made with the following request:

traversal-poc change

  1. Now, if we look at the server, we can see the file created in the traversed directory and the replaced poc-file:

Changed files

Impact

  • Possibility to upload files to external directories;
  • Possibility to rewrite any file owned by kuiper user on the filesystem.

Reported by Alexey Kosmachev, Lead Pentester from Bi.Zone

Database specific
{
    "github_reviewed": true,
    "nvd_published_at": null,
    "severity": "HIGH",
    "cwe_ids": [
        "CWE-24"
    ],
    "github_reviewed_at": "2025-07-03T14:18:04Z"
}
References

Affected packages

Go / github.com/lf-edge/ekuiper/v2

Package

Name
github.com/lf-edge/ekuiper/v2
View open source insights on deps.dev
Purl
pkg:golang/github.com/lf-edge/ekuiper/v2

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.0

Go / github.com/lf-edge/ekuiper

Package

Name
github.com/lf-edge/ekuiper
View open source insights on deps.dev
Purl
pkg:golang/github.com/lf-edge/ekuiper

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.14.7