Bug 1598928 (CVE-2018-10917)
Summary: | CVE-2018-10917 pulp: Improper path parsing leads to overwriting of iso repositories | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | austin, bbuckingham, bcourt, bizhang, bkearney, bmbouter, bmcclain, dblechte, dfediuck, eedri, ipanova, jortel, mgoldboi, michal.skrivanek, mmccune, mrike, ohadlevy, pcreech, rchan, rcosta, rjerrido, sbonazzo, security-response-team, sherold |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A path traversal flaw was found in the ISO repository plugin for pulp. An attacker, with access to a repository feeding pulp can carefully craft his repository to overwrite arbitrary files owned by the Apache webserver.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:32:03 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1611032, 1616079, 1640223 | ||
Bug Blocks: | 1598930 |
Description
Pedro Sampaio
2018-07-06 21:28:18 UTC
Statement: Red Hat Enterprise Virtualization Hypervisor includes only selected components of pulp, which are not affected by this flaw. Acknowledgments: Name: Simon Baatz (Telekom Deutschland GmbH) Created pulp tracking bugs for this issue: Affects: fedora-all [bug 1616079] Red Hat Update Infrastructure (RHUI) does not ship ISO content so the vulnerability cannot be triggered during regular usage of rhui-manager. However a user could still run (or be tricked into running) pulp commands to trigger the vulnerability on the Red Hat Update Appliance (RHUA). This issue has been addressed in the following products: Red Hat Satellite 6.5 for RHEL 7 Via RHSA-2019:1222 https://access.redhat.com/errata/RHSA-2019:1222 |