CVE编号
CVE-2022-29180
利用情况
暂无
补丁情况
N/A
披露时间
2022-05-07
漏洞描述
A vulnerability in which attackers could forge HTTP requests to manipulate the `charm` data directory to access or delete anything on the server. This has been patched and is available in release [v0.12.1](https://github.com/charmbracelet/charm/releases/tag/v0.12.1). We recommend that all users running self-hosted `charm` instances update immediately. This vulnerability was found in-house and we haven't been notified of any potential exploiters. ### Additional notes * Encrypted user data uploaded to the Charm server is safe as Charm servers cannot decrypt user data. This includes filenames, paths, and all key-value data. * Users running the official Charm [Docker images](https://github.com/charmbracelet/charm/blob/main/docker.md) are at minimal risk because the exploit is limited to the containerized filesystem.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://github.com/charmbracelet/charm/commit/3c90668f955c7ce5ef721e4fc9faee7... |
|
https://github.com/charmbracelet/charm/security/advisories/GHSA-4wpp-w5r4-7v5v |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 |
charm |
charm |
* |
|
|
9.8
-
攻击路径
网络
-
攻击复杂度
低 -
权限要求
无 -
影响范围
未更改 -
用户交互
无 -
可用性
高 -
保密性
高 -
完整性
高
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- 我的微信
- 微信扫一扫
-
- 我的微信公众号
- 微信扫一扫
-
评论