Bug 1584407
Summary: | ant: arbitrary file write vulnerability and arbitrary code execution using a specially crafted zip file | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | abergmann, akurtako, bcourt, bkearney, carnil, dmoppert, ggainey, jaromir.capik, java-maint, java-sig-commits, jmatthew, meissner, mizdebsk, mmccune, mrike, msimacek, msrb, ohadlevy, pcheung, rchan, security-response-team, tjay, tlestach, tsanders, vkadlcik |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | ant 1.9.12 | Doc Type: | If docs needed, set a value |
Doc Text: |
It was discovered that Ant's unzip and untar targets permit the extraction of files outside the target directory. A crafted zip or tar file submitted to an Ant build could create or overwrite arbitrary files with the privileges of the user running Ant.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2018-08-06 03:47:25 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1585543, 1585544, 1588276, 1588277 | ||
Bug Blocks: | 1584408 |
Description
Laura Pardo
2018-05-30 20:08:48 UTC
According to the reporter, this was fixed upstream in version 1.9.12. Relevant upstream commits seem to be: https://github.com/apache/ant/commit/e56e54565804991c62ec76dad385d2bdda8972a7 https://github.com/apache/ant/commit/1a2b1e37e3616991588f21efa89c474dd6ff83ff https://github.com/apache/ant/commit/f72406d53cfb3b3425cc9d000eea421a0e05d8fe https://github.com/apache/ant/commit/857095da5153fd18504b46f276d84f1e76a66970 Statement: This issue affects the versions of the nutch package as shipped with Red Hat Satellite 5. However, this flaw is not known to be exploitable under any supported scenario in Satellite 5. A future update may address this issue. Acknowledgments: Name: Danny Grander (Snyk) Created ant tracking bugs for this issue: Affects: fedora-all [bug 1588277] ant-1.10.1-10.fc28 has been pushed to the Fedora 28 stable repository. If problems still persist, please make note of it in this bug report. External References: https://snyk.io/research/zip-slip-vulnerability ant-1.10.1-10.fc27 has been pushed to the Fedora 27 stable repository. If problems still persist, please make note of it in this bug report. The fixes as released in 1.10.4 and 1.9.12 were incomplete, there was a respective followup with https://github.com/apache/ant/commit/6a41d62cb9ab4e640b72cb4de42a6c211dea645d https://github.com/apache/ant/commit/5a8c37b271677587046bfd0fea18c1675d5a6300 I requested a CVE for the incomplete fix to CVE-2018-10886. The assignment of CVE-2018-10886 is withdrawn as Apache Ant is not in Red Hat's scope as a CNA. The Apache project will follow up with MITRE. |