First published: Tue Jan 04 2022(Updated: )
Spinnaker is an open source, multi-cloud continuous delivery platform. A path traversal vulnerability was discovered in uses of TAR files by AppEngine for deployments. This uses a utility to extract files locally for deployment without validating the paths in that deployment don't override system files. This would allow an attacker to override files on the container, POTENTIALLY introducing a MITM type attack vector by replacing libraries or injecting wrapper files. Users are advised to update as soon as possible. For users unable to update disable Google AppEngine deployments and/or disable artifacts that provide TARs.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Spinnaker | <1.24.7 | |
Linuxfoundation Spinnaker | >=1.25.0<1.25.7 | |
Linuxfoundation Spinnaker | >=1.26.0<1.26.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39143 is a path traversal vulnerability in Spinnaker, an open source multi-cloud continuous delivery platform.
The severity of CVE-2021-39143 is high, with a CVSS score of 7.1.
CVE-2021-39143 affects Spinnaker versions 1.24.7 to 1.26.7, allowing path traversal attacks in TAR file deployments.
To mitigate the CVE-2021-39143 vulnerability in Spinnaker, update to a version higher than 1.26.7.
You can find more information about CVE-2021-39143 in the Spinnaker security advisories at https://github.com/spinnaker/spinnaker/security/advisories/GHSA-34jx-3vmr-56v8.