SECURITY: No validation on volume host paths allows arbitrary filesystem access #35
Labels
No Milestone
No project
No Assignees
2 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: sneak/upaas#35
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Severity: HIGH
File:
internal/handlers/app.golines 525-545 (HandleVolumeAdd)Description
When adding a volume mount, the
host_pathform value is accepted without any validation or sanitization. An authenticated user can specify any host path (e.g.,/etc/shadow,/var/run/docker.sock,/) and it will be bind-mounted into the container.While this is a single-user system and the user is already an admin, this is still a defense-in-depth concern:
Suggested Fix
allowed_volume_prefix(e.g.,/data/) that restricts host paths/etc,/var/run/docker.sock,/proc,/sys..traversal)dupe #20