CVE-2024-24765: CasaOS-UserService allows unauthorized access to any file
Summary
http://demo.casaos.io/v1/users/image?path=/var/lib/casaos/1/avatar.png
Originally it was to get the url of the user’s avatar, but the path filtering was not strict, making it possible to get any file on the system.
Details
Construct paths to get any file.
Such as the CasaOS user database, and furthermore can obtain system root privileges.
PoC
http://demo.casaos.io/v1/users/image?path=/var/lib/casaos/conf/../db/user.db
Impact
v0.4.6 all previous versions
References
- github.com/IceWhaleTech/CasaOS-UserService
- github.com/IceWhaleTech/CasaOS-UserService/commit/3f4558e23c0a9958f9a0e20aabc64aa8fd51840e
- github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7
- github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-h5gf-cmm8-cg7c
- github.com/advisories/GHSA-h5gf-cmm8-cg7c
- nvd.nist.gov/vuln/detail/CVE-2024-24765
Detect and mitigate CVE-2024-24765 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →