Bug 2066887

Summary: Dependabot alert: Path traversal in github.com/valyala/fasthttp
Product: OpenShift Container Platform Reporter: Jack Ding <jacding>
Component: Cloud Native EventsAssignee: Jack Ding <jacding>
Cloud Native Events sub component: Cloud Event Proxy QA Contact: yliu1
Status: CLOSED ERRATA Docs Contact:
Severity: low    
Priority: low CC: aos-bugs, aputtur, ijolliff, jacding
Version: 4.11   
Target Milestone: ---   
Target Release: 4.11.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of:
: 2066889 2091106 (view as bug list) Environment:
Last Closed: 2022-08-10 10:24:22 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Jack Ding 2022-03-22 16:56:12 UTC
Description of problem:

There is an security warning on the fasthttp used by consumer example code. The version of fasthttp needs to be updated.

https://github.com/redhat-cne/cloud-event-proxy/security/dependabot/1

The package github.com/valyala/fasthttp before 1.34.0 is vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. Note: This security issue impacts Windows users only.

Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

Comment 1 Jack Ding 2022-03-23 03:09:30 UTC
Note that this issue does not apply to production code.

Comment 2 Jack Ding 2022-03-24 02:25:12 UTC
Fix merged https://github.com/redhat-cne/cloud-event-proxy/pull/103

Comment 3 Jack Ding 2022-03-24 02:27:29 UTC
verified by Github Dependabot.

Comment 7 errata-xmlrpc 2022-08-10 10:24:22 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: OpenShift Container Platform 4.11.0 extras and security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:5070