GHSA-7jf5-fvgf-48c6

Suggest an improvement
Source
https://github.com/advisories/GHSA-7jf5-fvgf-48c6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-7jf5-fvgf-48c6/GHSA-7jf5-fvgf-48c6.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-7jf5-fvgf-48c6
Aliases
Published
2023-01-19T00:30:30Z
Modified
2024-08-20T20:58:50.450254Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Velociraptor subject to Path Traversal
Details

Rapid7 Velociraptor did not properly sanitize the client ID parameter to the CreateCollection API, allowing a directory traversal in where the collection task could be written. It was possible to provide a client id of "../clients/server" to schedule the collection for the server (as a server artifact), but only require privileges to schedule collections on the client. Normally, to schedule an artifact on the server, the COLLECTSERVER permission is required. This permission is normally only granted to "administrator" role. Due to this issue, it is sufficient to have the COLLECTCLIENT privilege, which is normally granted to the "investigator" role. To exploit this vulnerability, the attacker must already have a Velociraptor user account at least "investigator" level, and be able to authenticate to the GUI and issue an API call to the backend. Typically, most users deploy Velociraptor with limited access to a trusted group, and most users will already be administrators within the GUI. This issue affects Velociraptor versions before 0.6.7-5. Version 0.6.7-5, released January 16, 2023, fixes the issue.

Database specific
{
    "nvd_published_at": "2023-01-18T22:15:00Z",
    "github_reviewed_at": "2023-02-01T01:37:24Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-22"
    ]
}
References

Affected packages

Go / www.velocidex.com/golang/velociraptor

Package

Name
www.velocidex.com/golang/velociraptor
View open source insights on deps.dev
Purl
pkg:golang/www.velocidex.com/golang/velociraptor

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.7-5