CVE-2023-36811: Archive spoofing vulnerability in borgbackup
(updated )
A flaw in the cryptographic authentication scheme in borgbackup allowed an attacker to fake archives and potentially indirectly cause backup data loss in the repository.
The attack requires an attacker to be able to
- insert files (with no additional headers) into backups
- gain write access to the repository
This vulnerability does not disclose plaintext to the attacker, nor does it affect the authenticity of existing archives.
Creating plausible fake archives may be feasible for empty or small archives, but is unlikely for large archives.
Affected are all borgbackup releases prior to 1.2.5.
Note: CVSS scoring model seemed to badly fit for this case, thus I manually set score to “moderate”.
References
- github.com/advisories/GHSA-8fjr-hghr-4m99
- github.com/borgbackup/borg
- github.com/borgbackup/borg/blob/1.2.5-cvedocs/docs/changes.rst
- github.com/borgbackup/borg/blob/1.2.6/docs/changes.rst
- github.com/borgbackup/borg/commit/3eb070191da10c2d3f7bc6484cf3d51c3045f884
- github.com/borgbackup/borg/security/advisories/GHSA-8fjr-hghr-4m99
- github.com/pypa/advisory-database/tree/main/vulns/borgbackup/PYSEC-2023-164.yaml
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5Q3OHXERTU547SEQ3YREZXHOCYNLVD63
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOZDFIYEBIOKSIEAXUJJJFUJTAJ7TF3C
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUCQSMAWOJBCRGF6XPKEZ2TPGAPNKIWV
- nvd.nist.gov/vuln/detail/CVE-2023-36811
Detect and mitigate CVE-2023-36811 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →