CVE-2019-17109 – koji
Package
Manager: pip
Name: koji
Vulnerable Version: >=1.14.0 <1.14.3 || >=1.15.0 <1.15.3 || >=1.16.0 <1.16.3 || >=1.17.0 <1.17.1 || >=1.18.0 <1.18.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00636 pctl0.69501
Details
koji hub allows arbitrary upload destinations The way that the hub code validates upload paths allows for an attacker to choose an arbitrary destination for the uploaded file. Uploading still requires login. However, an attacker with credentials could damage the integrity of the Koji system. ### Workaround There is no known workaround. All Koji admins are encouraged to update to a fixed version as soon as possible. ### Fix Koji versions 1.14.3, 1.15.3, 1.16.3, 1.17.1, and 1.18.1 all include patches to solve this vulnerability.
Metadata
Created: 2022-05-24T16:58:31Z
Modified: 2024-09-27T18:30:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-7498-c9fm-g64p/GHSA-7498-c9fm-g64p.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-7498-c9fm-g64p
Finding: F063
Auto approve: 1