koji hub allows arbitrary upload destinations
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Sep 27, 2024
Package
Affected versions
>= 1.14.0, < 1.14.3
>= 1.15.0, < 1.15.3
>= 1.16.0, < 1.16.3
>= 1.17.0, < 1.17.1
>= 1.18.0, < 1.18.1
Patched versions
1.14.3
1.15.3
1.16.3
1.17.1
1.18.1
Description
Published by the National Vulnerability Database
Oct 9, 2019
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Apr 29, 2024
Last updated
Sep 27, 2024
The way that the hub code validates upload paths allows for an attacker to choose an arbitrary destination for the uploaded file.
Uploading still requires login. However, an attacker with credentials could damage the integrity of the Koji system.
Workaround
There is no known workaround. All Koji admins are encouraged to update to a fixed version as soon as possible.
Fix
Koji versions 1.14.3, 1.15.3, 1.16.3, 1.17.1, and 1.18.1 all include patches to solve this vulnerability.
References