Skip to content

Commit 4be4457

Browse files
1 parent f97be7b commit 4be4457

File tree

2 files changed

+127
-0
lines changed

2 files changed

+127
-0
lines changed
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2fcv-qww3-9v6h",
4+
"modified": "2025-11-24T23:32:11Z",
5+
"published": "2025-11-24T23:32:11Z",
6+
"aliases": [],
7+
"summary": "Babylon's malformed vote extensions are not rejected",
8+
"details": "### Summary\n\nAdversarial validators can send large vote extensions by using non-existing protobuf tags. This will result in the rejection of the subsequent block proposal. Eventually, all block proposals will be rejected by all validators.\n\n### Impact\n\nA small group of adversarial validators can cause a chain halt.",
9+
"severity": [
10+
{
11+
"type": "CVSS_V4",
12+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "Go",
19+
"name": "github.com/babylonlabs-io/babylon/v4"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "4.1.0"
30+
}
31+
]
32+
}
33+
]
34+
}
35+
],
36+
"references": [
37+
{
38+
"type": "WEB",
39+
"url": "https://github.com/babylonlabs-io/babylon/security/advisories/GHSA-2fcv-qww3-9v6h"
40+
},
41+
{
42+
"type": "WEB",
43+
"url": "https://github.com/babylonlabs-io/babylon/pull/1873/commits/86f38abd2dca5a656195a9954bb569a08d662e2b"
44+
},
45+
{
46+
"type": "PACKAGE",
47+
"url": "https://github.com/babylonlabs-io/babylon"
48+
},
49+
{
50+
"type": "WEB",
51+
"url": "https://github.com/babylonlabs-io/babylon/releases/tag/v4.1.0"
52+
}
53+
],
54+
"database_specific": {
55+
"cwe_ids": [
56+
"CWE-770"
57+
],
58+
"severity": "HIGH",
59+
"github_reviewed": true,
60+
"github_reviewed_at": "2025-11-24T23:32:11Z",
61+
"nvd_published_at": null
62+
}
63+
}
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-rj4j-2jph-gg43",
4+
"modified": "2025-11-24T23:31:40Z",
5+
"published": "2025-11-24T23:31:39Z",
6+
"aliases": [],
7+
"summary": "LF Edge eKuiper is vulnerable to Arbitrary File Read/Write via unsanitized names and zip extraction",
8+
"details": "### Summary\nMultiple path traversal and unsafe path handling vulnerabilities were discovered in eKuiper prior to the fixes implemented in PR [lf-edge/ekuiper#3911](https://github.com/lf-edge/ekuiper/pull/3911). The issues allow attacker-controlled input (rule names, schema versions, plugin names, uploaded file names, and ZIP entries) to influence file system paths used by the application. In vulnerable deployments, this can permit files to be created, overwritten, or extracted outside the intended directories, potentially enabling disclosure of sensitive files, tampering with configuration or plugin binaries, denial of service, or other host compromise scenarios.\n\nSeveral components used unvalidated user input when constructing filesystem paths or when extracting archives. In each case, input was accepted and used directly in path operations (join, create, delete, extract) without sufficient sanitization or canonicalization, allowing the input to include path separators, `..` segments, or absolute paths.\n\n### Impact\n**Arbitrary file overwrite / deletion:** attackers could overwrite or delete files outside the intended directory, which can corrupt application data, remove logs, or disable services.\n\n### Resources\n- https://github.com/lf-edge/ekuiper/commit/58362b089c76f08c400fe0dbb3667e6e871eaffd\n- https://github.com/lf-edge/ekuiper/pull/3911",
9+
"severity": [
10+
{
11+
"type": "CVSS_V4",
12+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "Go",
19+
"name": "github.com/lf-edge/ekuiper/v2"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "2.3.0"
30+
}
31+
]
32+
}
33+
]
34+
}
35+
],
36+
"references": [
37+
{
38+
"type": "WEB",
39+
"url": "https://github.com/lf-edge/ekuiper/security/advisories/GHSA-rj4j-2jph-gg43"
40+
},
41+
{
42+
"type": "WEB",
43+
"url": "https://github.com/lf-edge/ekuiper/pull/3911"
44+
},
45+
{
46+
"type": "WEB",
47+
"url": "https://github.com/lf-edge/ekuiper/commit/58362b089c76f08c400fe0dbb3667e6e871eaffd"
48+
},
49+
{
50+
"type": "PACKAGE",
51+
"url": "https://github.com/lf-edge/ekuiper"
52+
}
53+
],
54+
"database_specific": {
55+
"cwe_ids": [
56+
"CWE-22",
57+
"CWE-23"
58+
],
59+
"severity": "CRITICAL",
60+
"github_reviewed": true,
61+
"github_reviewed_at": "2025-11-24T23:31:39Z",
62+
"nvd_published_at": null
63+
}
64+
}

0 commit comments

Comments
 (0)