This repository has been archived by the owner on Nov 20, 2021. It is now read-only.
CVE-2021-21272 (High) detected in github.com/deislabs/oras/pkg/content-v0.9.0 #24
Labels
security vulnerability
Security vulnerability detected by WhiteSource
CVE-2021-21272 - High Severity Vulnerability
Vulnerable Library - github.com/deislabs/oras/pkg/content-v0.9.0
OCI Registry As Storage
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a "zip-slip" vulnerability. The directory support feature allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on the host filesystem outside of the user-specified directory unexpectedly with the same permissions as the user who runs
oras pull
. Users of the affected versions are impacted if they areoras
CLI users who runsoras pull
, or if they are Go programs, which invokegithub.com/deislabs/oras/pkg/content.FileStore
. The problem has been fixed in version 0.9.0. Fororas
CLI users, there is no workarounds other than pulling from a trusted artifact provider. Fororas
package users, the workaround is to not usegithub.com/deislabs/oras/pkg/content.FileStore
, and use other content stores instead, or pull from a trusted artifact provider.Publish Date: 2021-01-25
URL: CVE-2021-21272
CVSS 3 Score Details (7.7)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-g5v4-5x39-vwhx
Release Date: 2021-01-25
Fix Resolution: v0.9.0
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: