Headline
CVE-2021-3907
OctoRPKI does not escape a URI with a filename containing "…", this allows a repository to create a file, (ex. rsync://example.org/repo/…/…/etc/cron.daily/evil.roa), which would then be written to disk outside the base cache folder. This could allow for remote code execution on the host machine OctoRPKI is running on.
Arbitrary filepath traversal via URI injection
Package
gomod github.com/cloudflare/cfrpki/cmd/octorpki (Go)
gomod github.com/cloudflare/cfrpki/pki (Go)
Description
OctoRPKI does not escape a URI with a filename containing "…", this allows a repository to create a file, (ex. rsync://example.org/repo/…/…/etc/cron.daily/evil.roa), which would then be written to disk outside the base cache folder. This could allow for remote code execution on the host machine OctoRPKI is running on.
Patches****For more information
If you have any questions or comments about this advisory email us at [email protected]