Sandstorm before build 0.203 allows remote attackers to read any specified file under /etc or /run via the sandbox backup function. The root cause is that the findFilesToZip function doesn't filter Line Feed (\n) characters in a directory name.
References
Link | Resource |
---|---|
https://sandstorm.io/news/2017-03-02-security-review | Vendor Advisory |
https://github.com/sandstorm-io/sandstorm/commit/6e8572ea8bb56d0216bb1b410e5040edc051b120 | Patch Third Party Advisory |
https://github.com/sandstorm-io/sandstorm/commit/4ea8df7403381d9b657b121b3c98d8081b27414d | Patch Third Party Advisory |
https://github.com/sandstorm-io/sandstorm/blob/v0.202/src/sandstorm/backup.c%2B%2B#L271 | Third Party Advisory |
https://devco.re/blog/2018/01/26/Sandstorm-Security-Review-CVE-2017-6200-en/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2018-02-06 08:29
Updated : 2018-03-13 12:29
NVD link : CVE-2017-6200
Mitre link : CVE-2017-6200
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
sandstorm
- sandstorm