Vulnerability Details : CVE-2022-36007
Potential exploit
Venice is a Clojure inspired sandboxed Lisp dialect with excellent Java interoperability. A partial path traversal issue exists within the functions `load-file` and `load-resource`. These functions can be limited to load files from a list of load paths. Assuming Venice has been configured with the load paths: `[ "/Users/foo/resources" ]` When passing **relative** paths to these two vulnerable functions everything is fine: `(load-resource "test.png")` => loads the file "/Users/foo/resources/test.png" `(load-resource "../resources-alt/test.png")` => rejected, outside the load path When passing **absolute** paths to these two vulnerable functions Venice may return files outside the configured load paths: `(load-resource "/Users/foo/resources/test.png")` => loads the file "/Users/foo/resources/test.png" `(load-resource "/Users/foo/resources-alt/test.png")` => loads the file "/Users/foo/resources-alt/test.png" !!! The latter call suffers from the _Partial Path Traversal_ vulnerability. This issue’s scope is limited to absolute paths whose name prefix matches a load path. E.g. for a load-path `"/Users/foo/resources"`, the actor can cause loading a resource also from `"/Users/foo/resources-alt"`, but not from `"/Users/foo/images"`. Versions of Venice before and including v1.10.17 are affected by this issue. Upgrade to Venice >= 1.10.18, if you are on a version < 1.10.18. There are currently no known workarounds.
Vulnerability category: Directory traversal
Products affected by CVE-2022-36007
- cpe:2.3:a:venice_project:venice:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-36007
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-36007
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
1.8
|
1.4
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N |
1.8
|
4.2
|
GitHub, Inc. |
CWE ids for CVE-2022-36007
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: security-advisories@github.com (Primary)
References for CVE-2022-36007
-
https://github.com/jlangch/venice/commit/c942c73136333bc493050910f171a48e6f575b23
vuln-fix: Partial Path Traversal Vulnerability · jlangch/venice@c942c73 · GitHubPatch;Third Party Advisory
-
https://github.com/jlangch/venice/releases/tag/v1.10.17
Release Release 1.10.17 · jlangch/venice · GitHubRelease Notes;Third Party Advisory
-
https://github.com/jlangch/venice/security/advisories/GHSA-4mmh-5vw7-rgvj
Partial Path Traversal in com.github.jlangch:venice · Advisory · jlangch/venice · GitHubExploit;Third Party Advisory
-
https://github.com/jlangch/venice/commit/215ae91bb964013b0a2d70718a692832d561ae0a
Merge pull request #4 from BulkSecurityGeneratorProjectV2/fix/JLL/par… · jlangch/venice@215ae91 · GitHubPatch;Third Party Advisory
Jump to