Skip to content

User with ci:ReadAction permissions and write permissions to one path in a repository may copy objects from any path in the repository

Moderate
arielshaqed published GHSA-fvv5-h29g-f6w5 Feb 22, 2024

Package

gomod lakefs (Go)

Affected versions

>= 0.90.0 <=1.12.0

Patched versions

>= 1.12.1

Description

Impact

A bug in permissions validation allows a user with the ci:ReadAction permission to skip read checks when copying an object. If they additionally have read and write permission to path in the repository, they can copy an otherwise unreadable object and read it.

In order to be affected and exploitable, the following conditions must ALL occur on the same user:

  1. ci:ReadAction enabled for the repository. Predefined policies RepoManagementRead and RepoManagementFullAccess allow this action.
  2. fs:ReadObject and fs:WriteObject enabled for some path.
  3. fs:ReadObject not available for some path

Such a user can use (1) to copy the unreadable object (3) to a path that they can read and write (2). At that point they can read the object copy.

Patches

Releases >= 1.12.1 fix this issue in lakeFS.

Workarounds

As a workaround, use RBAC to deny ci:* permissions to all users, or to all users who have limited read access.

Many installations are unaffected:

  • Installations using ACLs are not affected. This includes all OSS installations that have not implemented an external authorization server. We do not know of any OSS installations that have implemented such a server. ACLs that allow ci:ReadAction also allow reading repositories, so no capabilities are granted.
  • Installations using RBAC that use only predefined policies with "all" ARNs ("*") are not affected. This includes all installations that have not defined any new groups in RBAC.

In order to be affected, installations using RBAC must define users and simultaneous allow ci:ReadAction and disallow fs:ReadObject for some path. ci:ReadAction is available in policies RepoManagementReadAll and RepoManagementFullAccess. By default these actions are configured for groups Developers and above, for all repositories and paths.

References

Severity

Moderate

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
High
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE ID

No known CVE

Weaknesses

No CWEs

Credits