Bug 2224945 (CVE-2023-38633)
Summary: | CVE-2023-38633 librsvg: Arbitrary file read when xinclude href has special characters | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sandipan Roy <saroy> |
Component: | vulnerability | Assignee: | Nobody <nobody> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | bdettelb, bmason, desktop-qa-list, dking, mclasen, otte |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A directory traversal vulnerability was discovered in the URL decoder of Librsvg. This issue occurs when xinclude href has special characters; demonstrated by href=".?../../../../../../../../../../etc/passwd" in an xi:include element, which can allow an attacker to send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system, affecting the data confidentiality.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2224946, 2224947, 2226689, 2226690, 2226691, 2226692, 2226693, 2226694, 2226695, 2226696 | ||
Bug Blocks: | 2224948 |
Description
Sandipan Roy
2023-07-24 03:16:57 UTC
Based on https://gitlab.gnome.org/GNOME/librsvg/-/issues/996#note_1806622 it seems that this may not have been classified appropriately, and so should be downgraded to medium severity (a local file is required, not network access, as incorrectly mentioned in the CVE). Nevertheless, I am investigating backporting fixes to all applicable branches. This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:4809 https://access.redhat.com/errata/RHSA-2023:4809 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:5081 https://access.redhat.com/errata/RHSA-2023:5081 |