First published: Wed Mar 24 2021(Updated: )
go-ipfs is an open-source golang implementation of IPFS which is a global, versioned, peer-to-peer filesystem. In go-ipfs before version 0.8.0-rc1, it is possible for path traversal to occur with DAGs containing relative paths during retrieval. This can cause files to be overwritten, or written to incorrect output directories. The issue can only occur when a get is done on an affected DAG. This is fixed in version 0.8.0-rc1.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go-ipfs | <=0.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-26279 is considered to be moderate due to the risk of path traversal leading to file overwriting.
To fix CVE-2020-26279, upgrade to go-ipfs version 0.8.0-rc1 or later.
The impact of CVE-2020-26279 is the potential for unauthorized file overwrites due to path traversal vulnerabilities.
go-ipfs versions before 0.8.0-rc1 are affected by CVE-2020-26279.
CVE-2020-26279 is primarily a local vulnerability, as it requires access to the affected system to exploit.