You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The application contains path traversal vulnerability (CWE-22) in multiple file operation handlers. An authenticated attacker can bypass directory-level authorisation by injecting traversal sequences into filename components, enabling unauthorised file removal, movement and copying across user boundaries within the same storage mount.
Details
The application contains path traversal vulnerability (CWE-22) in multiple file operation handlers (server/handles/fsmanage.go, server/handles/fsbatch.go, etc.). Filename components in req.Names, renameObject.SrcName, and renameObject.NewName are directly concatenated with validated directories using stdpath.Join() or fmt.Sprintf(). This allows ".." sequences to bypass path restrictions, enabling users to access other users' files within the same storage mount and perform unauthorized actions such as deletion, renaming, or copying of files.
Storage mount '/shared' configured with multiple users.
Alice has base path '/shared/alice'.
Admin has base path '/shared/admin' with private files.
Both users operate within the same storage mount.
Craft Malicious Request:
Alice sends a POST request to /api/fs/remove containing a filename with '../' in it.
curl -X POST -H "Content-Type: application/json" -d '{"dir":"/","names":["../admin/private.txt"]}' http://localhost:5244/api/fs/remove
Admin's file is deleted without Alice having authorisation for Admin's directory.
path_traversal.mov
Impact
This vulnerability enables privilege escalation within shared storage environments. An authenticated attacker with basic file operation permissions (remove/rename/copy/move) can bypass directory-level authorisation controls when multiple users exist within the same storage mount.
Attack Requirements:
Authenticated user account (not guest)
Basic file operation permissions
Multi-user environment within the same storage mount
Consequences:
Unauthorised data access: Read, copy, and exfiltrate files from other users' directories
Data destruction: Delete or rename files belonging to other users
Access control bypass: Circumvent directory isolation mechanisms
Integrity violation: Modify or move files across user boundaries
Credit
This vulnerability was discovered by:
XlabAI Team of Tencent Xuanwu Lab
Atuin Automated Vulnerability Discovery Engine
CVE and credit are preferred.
If you have any questions regarding the vulnerability details, please feel free to reach out to us for further discussion. Our email address is xlabai@tencent.com.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Learn more on MITRE.
Summary
The application contains path traversal vulnerability (CWE-22) in multiple file operation handlers. An authenticated attacker can bypass directory-level authorisation by injecting traversal sequences into filename components, enabling unauthorised file removal, movement and copying across user boundaries within the same storage mount.
Details
The application contains path traversal vulnerability (CWE-22) in multiple file operation handlers (server/handles/fsmanage.go, server/handles/fsbatch.go, etc.). Filename components in
req.Names,renameObject.SrcName, andrenameObject.NewNameare directly concatenated with validated directories usingstdpath.Join()orfmt.Sprintf(). This allows ".." sequences to bypass path restrictions, enabling users to access other users' files within the same storage mount and perform unauthorized actions such as deletion, renaming, or copying of files.FsRemove:
FsCopy:
FsBatchRename:
PoC
Alice sends a POST request to /api/fs/remove containing a filename with '../' in it.
Admin's file is deleted without Alice having authorisation for Admin's directory.
path_traversal.mov
Impact
This vulnerability enables privilege escalation within shared storage environments. An authenticated attacker with basic file operation permissions (remove/rename/copy/move) can bypass directory-level authorisation controls when multiple users exist within the same storage mount.
Attack Requirements:
Consequences:
Credit
This vulnerability was discovered by:
CVE and credit are preferred.
If you have any questions regarding the vulnerability details, please feel free to reach out to us for further discussion. Our email address is xlabai@tencent.com.