Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.

Bug 2066889

Summary: Dependabot alert: Path traversal in github.com/valyala/fasthttp
Product: OpenShift Container Platform Reporter: Jack Ding <jacding>
Component: Cloud Native EventsAssignee: Jack Ding <jacding>
Cloud Native Events sub component: Hardware Event Proxy QA Contact: nwaizer
Status: CLOSED ERRATA Docs Contact:
Severity: low    
Priority: low CC: aos-bugs, aputtur, ijolliff, jacding, nparekh, yliu1
Version: 4.11   
Target Milestone: ---   
Target Release: 4.11.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: 2066887 Environment:
Last Closed: 2022-08-10 10:24:22 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Jack Ding 2022-03-22 16:59:49 UTC
Description of problem:

There is an security warning on the fasthttp used by e2e test code. The version of fasthttp needs to be updated.

https://github.com/redhat-cne/hw-event-proxy/security/dependabot/1
https://github.com/redhat-cne/hw-event-proxy/security/dependabot/2

The package github.com/valyala/fasthttp before 1.34.0 is vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. Note: This security issue impacts Windows users only.

Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

Comment 1 Jack Ding 2022-03-23 03:09:41 UTC
Note that this issue does not apply to production code.

Comment 2 Jack Ding 2022-03-24 14:30:37 UTC
Fix merged. https://github.com/redhat-cne/hw-event-proxy/pull/71

Comment 6 errata-xmlrpc 2022-08-10 10:24:22 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: OpenShift Container Platform 4.11.0 extras and security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:5070