logo

GHSA-fvv5-h29g-f6w5 github.com/treeverse/lakefs

Package

Manager: go
Name: github.com/treeverse/lakefs
Vulnerable Version: >=0.90.0 <1.12.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: N/A pctlN/A

Details

User with ci:ReadAction permissions and write permissions to one path in a repository may copy objects from any path in the repository ### Impact A bug in permissions validation allows a user with the `ci:ReadAction` permission to skip read checks when copying an object. If they additionally have read and write permission to path in the repository, they can copy an otherwise unreadable object and read it. In order to be affected and exploitable, the following conditions must ALL occur on the same user: 1. `ci:ReadAction` enabled for the repository. Predefined policies RepoManagementRead and RepoManagementFullAccess allow this action. 2. `fs:ReadObject` and `fs:WriteObject` enabled for some path. 3. `fs:ReadObject` _not_ available for some path Such a user can use (1) to copy the unreadable object (3) to a path that they can read and write (2). At that point they can read the object copy. ### Patches Releases >= 1.12.1 fix this issue in lakeFS. ### Workarounds As a workaround, use RBAC to deny `ci:*` permissions to all users, or to all users who have limited read access. Many installations are unaffected: * **Installations using ACLs are _not_ affected.** This includes all OSS installations that have not implemented an external authorization server. We do not know of any OSS installations that have implemented such a server. ACLs that allow ci:ReadAction also allow reading repositories, so no capabilities are granted. * **Installations using RBAC that use only predefined policies with "all" ARNs ("*") are _not_ affected.** This includes **all installations that have not defined any new groups in RBAC.** In order to be affected, **installations using RBAC** must define users and simultaneous allow `ci:ReadAction` and disallow `fs:ReadObject` for some path. `ci:ReadAction` is available in policies RepoManagementReadAll and RepoManagementFullAccess. By default these actions are configured for groups Developers and above, for all repositories and paths. ### References * [lakeFS RBAC](https://docs.lakefs.io/reference/security/rbac.html)

Metadata

Created: 2024-02-22T21:36:04Z
Modified: 2024-02-22T21:36:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-fvv5-h29g-f6w5/GHSA-fvv5-h29g-f6w5.json
CWE IDs: []
Alternative ID: N/A
Finding: F039
Auto approve: 1