First published: Tue Jun 19 2018(Updated: )
An issue was discovered in Linaro LAVA before 2018.5.post1. Because of support for file: URLs, a user can force lava-server-gunicorn to download any file from the filesystem if it's readable by lavaserver and valid yaml.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linaro LAVA | <2018.5.post1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-12563.
The severity level of CVE-2018-12563 is medium, with a severity value of 6.5.
The affected software by CVE-2018-12563 is Linaro LAVA before version 2018.5.post1.
An attacker can exploit CVE-2018-12563 by using a file: URL to force lava-server-gunicorn to download any file from the filesystem if it's readable by lavaserver and valid yaml.
Yes, a fix is available for CVE-2018-12563. Please refer to the Linaro LAVA Git commit for more information.