Bug 1663904 (CVE-2018-1000850)

Summary: CVE-2018-1000850 retrofit: Directory traversal in RequestBuilder allows manipulation of resources
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: retrofit 2.5.0 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Retrofit, where it allowed directory traversal via its RequestBuilder class. An attacker could use this flaw to access information or commands outside of its set permissions.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-11-15 00:51:20 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1663905    

Description Andrej Nemec 2019-01-07 09:47:54 UTC
A directory traversal vulnerability was found in retrofit that can allow for resource manipulation. An attacker can add or remove resources which should not be available to him.

References:

https://github.com/square/retrofit/blob/master/CHANGELOG.md
https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982
https://ihacktoprotect.com/post/retrofit-path-traversal/

Comment 2 errata-xmlrpc 2019-11-14 21:18:06 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.5.0

Via RHSA-2019:3892 https://access.redhat.com/errata/RHSA-2019:3892

Comment 3 Product Security DevOps Team 2019-11-15 00:51:20 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2018-1000850