First published: Fri Jul 06 2018(Updated: )
## Withdrawn Advisory This advisory has been withdrawn because the package [pulpcore](https://pypi.org/project/pulpcore/) deals with pulp 3 only. This advisory concerns [pulp 2](https://github.com/pulp/pulp), which is not in a [supported ecosystem](https://github.com/github/advisory-database/blob/main/README.md#supported-ecosystems). ## Original Description pulp 2.16.x and possibly older is vulnerable to an improper path parsing. A malicious user or a malicious iso feed repository can write to locations accessible to the 'apache' user. This may lead to overwrite of published content on other iso repositories.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/pulpcore | <=2.16 | |
Pulpproject Pulp | <=2.16.0 | |
Pulpproject Pulp | =2.16.1 | |
Pulpproject Pulp | =2.16.2 | |
Pulpproject Pulp | =2.16.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this advisory is CVE-2018-10917.
The severity of CVE-2018-10917 is medium with a CVSS score of 6.5.
The software affected by CVE-2018-10917 includes pulpcore versions 2.16.0, 2.16.1, and 2.16.2.
To fix CVE-2018-10917, it is recommended to update to a version of pulpcore that is not affected by the vulnerability.
More information about CVE-2018-10917 can be found in the following references: [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1616079), [Red Hat Advisory](https://access.redhat.com/errata/RHSA-2019:1222), [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1598928).