borgbackup@1.0.3 vulnerabilities

Deduplicated, encrypted, authenticated and compressed backups

  • latest version

    1.4.0

  • latest non vulnerable version

  • first published

    9 years ago

  • latest version published

    5 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the borgbackup package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Improper Authorization

    Affected versions of this package are vulnerable to Improper Authorization due to allowing an attacker to access a mount with -o uid=1001,umask=077 as user 1000.

    How to fix Improper Authorization?

    Upgrade borgbackup to version 1.1.9 or higher.

    [,1.1.9)
    • M
    Improper Input Validation

    Affected versions of this package are vulnerable to Improper Input Validation leading to insecure path manipulation.

    When using e.g. --restrict-to-path /path/client1/ (with or without trailing slash does not make a difference), this acts like a path prefix match using /path/client1 (note the missing trailing slash).

    How to fix Improper Input Validation?

    Upgrade borgbackup to version 1.0.7 or higher.

    [,1.0.7)
    • M
    Cryptographic Operations are run Before Supporting Units are Ready

    Affected versions of this package are vulnerable to Cryptographic Operations are run Before Supporting Units are Ready due to a flaw in the cryptographic authentication scheme. An attacker can fake archives and potentially indirectly cause backup data loss in the repository by inserting files (with no additional headers) into backups and gaining write access to the repository.

    Note:

    Data loss after being attacked can be avoided by reviewing the archives (timestamp and contents valid and as expected) after any "borg check --repair" and before "borg prune".

    How to fix Cryptographic Operations are run Before Supporting Units are Ready?

    Upgrade borgbackup to version 1.2.5 or higher.

    [,1.2.5)
    • M
    Authentication Bypass

    borgbackup is a backup tool.

    Affected versions of this package are vulnerable to Authentication Bypass by Spoofing the list of Archives. Borg (aka BorgBackup) before 1.0.9 has a flaw in the cryptographic protocol used to authenticate the manifest (list of archives), potentially allowing an attacker to spoof the list of archives.

    [,1.0.9)
    • M
    Arbitrary File Overwrite

    borgbackup is a backup tool.

    Affected versions of this package are vulnerable to Arbitrary File Overwrite. BorgBackup before 1.0.9 has a flaw in the way duplicate archive names were processed during manifest recovery, potentially allowing an attacker to overwrite an archive.

    [,1.0.9)