-
Notifications
You must be signed in to change notification settings - Fork 403
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chartmuseum v0.13.1 vulnerable against Log Injection #518
Comments
Got it , will work out ASAP . Thank you . |
…ing vulnerable request Fixes #518 Signed-off-by: scnace <[email protected]>
Hello @janstarke, and thanks for opening this issue. In the future, please responsibly disclose security issues following the guidelines here. Unfortunately I was not able reproduce this on both Mac and Linux. Instead the newline char
Could you share some more information on how to recreate this / how you are running v0.13.1? |
I see the issue. This seems to be affected only when using both For users seeing this issue - these settings are not the default in the Helm chart deployment. You are likely unaffected unless you have specified both The default for the binary itself is |
…ing vulnerable request (#519) Fixes #518 Signed-off-by: scnace <[email protected]> Co-authored-by: Josh Dolitsky <[email protected]>
Dear all,
I found that chartmuseum (v0.13.1) accepts
%0a
in URLs and forwards this character (newline) to logfiles, which allows attackers to inject custom logfile messages.PoC
inserts a newline between
ind
andex.yaml
in the logfile. An attacker can insert information such as "user 'XYZ' has been logged out" prior to perform malicious activity, to cover his traces.Additional Information
https://capec.mitre.org/data/definitions/93.html
The text was updated successfully, but these errors were encountered: