Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
lakeFS vulnerable to path traversal in local block adapter allow cross-namespace and sibling directory access
Vulnerability Description
lakeFS is an open-source tool that transforms object storage into a Git-like repositories. Prior to 1.77.0, the local block adapter (pkg/block/local/adapter.go) allows authenticated users to read and write files outside their designated storage boundaries. The verifyRelPath function used strings.HasPrefix() to verify that requested paths fall within the configured storage directory. This check was insufficient because it validated only the path prefix without requiring a path separator, allowing access to sibling directories with similar names. Also, the adapter verified that resolved paths stayed within the adapter's base path, but did not verify that object identifiers stayed within their designated storage namespace. This allowed attackers to use path traversal sequences in the object identifier to access files in other namespaces. Fixed in version v1.77.0.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
lakeFS 路径遍历漏洞
Vulnerability Description
lakeFS是Treeverse开源的一款开源工具,可将您的对象存储转换为类似 Git 的存储库。 lakeFS 1.77.0之前版本存在路径遍历漏洞,该漏洞源于本地块适配器路径验证不足,可能导致经过身份验证的用户读写指定存储边界之外的文件。
CVSS Information
N/A
Vulnerability Type
N/A