Lucene search

K
archlinuxArchLinuxASA-202107-35
HistoryJul 20, 2021 - 12:00 a.m.

[ASA-202107-35] dino: directory traversal

2021-07-2000:00:00
security.archlinux.org
120

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

49.4%

Arch Linux Security Advisory ASA-202107-35

Severity: Medium
Date : 2021-07-20
CVE-ID : CVE-2021-33896
Package : dino
Type : directory traversal
Remote : Yes
Link : https://security.archlinux.org/AVG-2043

Summary

The package dino before version 0.2.1-1 is vulnerable to directory
traversal.

Resolution

Upgrade to 0.2.1-1.

pacman -Syu “dino>=0.2.1-1”

The problem has been fixed upstream in version 0.2.1.

Workaround

None.

Description

It was discovered that when a user receives and downloads a file in
Dino before version 0.2.1, URI-encoded path separators in the file name
will be decoded, allowing an attacker to traverse directories and
create arbitrary files in the context of the user.

This vulnerability does not allow to overwrite or modify existing files
and the attacker cannot control the executable flag of created files.
However, third-party software may be affected by newly created
configuration files, potentially allowing for code execution.

The file name, including path separators, is displayed to the user,
however, long file names are ellipsized in the middle of the file name,
allowing the attacker to hide the malicious path separators, as long as
the resulting file name has sufficient length.

Impact

A remote attacker could create files in arbitrary locations in the
context of the user by tricking the user into downloading a file with a
crafted file name.

References

https://dino.im/security/cve-2021-33896/
https://github.com/dino/dino/commit/1eaad1ccfbd00c6e76650535496531c172453994
https://security.archlinux.org/CVE-2021-33896

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanydino< 0.2.1-1UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

49.4%