logo

CVE-2019-17109 koji

Package

Manager: pip
Name: koji
Vulnerable Version: >=1.14.0 <1.14.3 || >=1.15.0 <1.15.3 || >=1.16.0 <1.16.3 || >=1.17.0 <1.17.1 || >=1.18.0 <1.18.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00636 pctl0.69501

Details

koji hub allows arbitrary upload destinations The way that the hub code validates upload paths allows for an attacker to choose an arbitrary destination for the uploaded file. Uploading still requires login. However, an attacker with credentials could damage the integrity of the Koji system. ### Workaround There is no known workaround. All Koji admins are encouraged to update to a fixed version as soon as possible. ### Fix Koji versions 1.14.3, 1.15.3, 1.16.3, 1.17.1, and 1.18.1 all include patches to solve this vulnerability.

Metadata

Created: 2022-05-24T16:58:31Z
Modified: 2024-09-27T18:30:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-7498-c9fm-g64p/GHSA-7498-c9fm-g64p.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-7498-c9fm-g64p
Finding: F063
Auto approve: 1