In Open-iSCSI tcmu-runner 1.3.x, 1.4.x, and 1.5.x through 1.5.2, xcopy_locate_udev in tcmur_cmd_handler.c lacks a check for transport-layer restrictions, allowing remote attackers to read or write files via directory traversal in an XCOPY request. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. NOTE: relative to CVE-2020-28374, this is a similar mistake in a different algorithm.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2021/01/13/5 | Mailing List Mitigation Third Party Advisory |
https://bugzilla.suse.com/attachment.cgi?id=844938 | Issue Tracking Third Party Advisory |
https://bugzilla.suse.com/show_bug.cgi?id=1178372 | Issue Tracking Third Party Advisory |
https://github.com/open-iscsi/tcmu-runner/pull/644 | Patch Third Party Advisory |
https://www.openwall.com/lists/oss-security/2021/01/12/12 | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-01-13 16:15
Updated : 2024-02-04 21:23
NVD link : CVE-2021-3139
Mitre link : CVE-2021-3139
CVE.ORG link : CVE-2021-3139
JSON object : View
Products Affected
tcmu-runner_project
- tcmu-runner
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')