Skip to content

Commit e0aae4f

Browse files
1 parent ba31f70 commit e0aae4f

1 file changed

Lines changed: 73 additions & 0 deletions

File tree

Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-qmj2-8r24-xxcq",
4+
"modified": "2026-02-02T20:01:30Z",
5+
"published": "2026-02-02T20:01:30Z",
6+
"aliases": [
7+
"CVE-2026-25059"
8+
],
9+
"summary": "OpenList vulnerable to Path Traversal in file copy and remove handlers",
10+
"details": "### Summary\nThe application contains a Path Traversal vulnerability (CWE-22) in multiple file operation handlers. An authenticated attacker can bypass directory-level authorisation by injecting traversal sequences into filename components, enabling unauthorised file removal and copying across user boundaries within the same storage mount.\n\n### Details\nThe application contains a Path Traversal vulnerability (CWE-22) in multiple file operation handlers in *server/handles/fsmanage.go*. Filename components in `req.Names` are directly concatenated with validated directories using `stdpath.Join`. This allows \"..\" sequences to bypass path restrictions, enabling users to access other users' files within the same storage mount and perform unauthorized actions such as deletion, renaming, or copying of files.\n\n[FsRemove](https://github.com/OpenListTeam/OpenList/blob/5db2172ed681346b69ed468c73c1f01b6ed455ea/server/handles/fsmanage.go#L284-L285):\n~~~\nfunc FsRemove(c *gin.Context) {\n\t// ...\n\tfor _, name := range req.Names {\n\t\terr := fs.Remove(c, stdpath.Join(reqDir, name))\n~~~\n\n[FsCopy](https://github.com/OpenListTeam/OpenList/blob/5db2172ed681346b69ed468c73c1f01b6ed455ea/server/handles/fsmanage.go#L163-L164):\n~~~\nfunc FsCopy(c *gin.Context) {\n\t// ...\n\tif !req.Overwrite {\n\t\tfor _, name := range req.Names {\n\t\t\tif res, _ := fs.Get(c.Request.Context(), stdpath.Join(dstDir, name), &fs.GetArgs{NoLog: true}); res != nil {\n~~~\n\n\n### PoC\nScenario:​ A normal user (\"alice\") bypasses directory restrictions to read files outside her authorized path.\n\nEnvironment setup:\n- Local storage mount as '/local'.\n- An admin file \"adminsecret.txt\" is placed under /local\n- Alice has base path '/local/alice'.\n\n\nhttps://github.com/user-attachments/assets/5d73bbec-29e5-4c52-8af3-4c70b26d9d0e\n\n\n\n### Impact\nThis vulnerability enables privilege escalation within shared storage environments. An authenticated attacker with basic file operation permissions (remove/copy) can bypass directory-level authorisation controls when multiple users exist within the same storage mount.\n\nAttack Requirements:\n- Authenticated user account (not guest)\n- Basic file operation permissions (remove/copy)\n- Multi-user environment within the same storage mount\n- Knowledge (or ability to guess) the target file's name and path\n\nConsequences:\n- Unauthorised data access: Read, copy, and exfiltrate files from other users' directories\n- Data destruction: Delete files belonging to other users\n\n### Note\n\nThis vulnerability was discovered by:\n- XlabAI Team of Tencent Xuanwu Lab\n- Atuin Automated Vulnerability Discovery Engine\n\nCVE and credit are preferred.\n\nIf users have any questions regarding the vulnerability details, please feel free to reach out for further discussion. Email [xlabai@tencent.com](mailto:xlabai@tencent.com).\n\nThe security industry standard [90+30 disclosure policy](https://googleprojectzero.blogspot.com/p/vulnerability-disclosure-policy.html) is followed. Should the aforementioned vulnerabilities remain unfixed after 90 days of submission, all information about the issues will be publicly disclosed.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/OpenListTeam/OpenList/v4"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "4.1.10"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/OpenListTeam/OpenList/security/advisories/GHSA-qmj2-8r24-xxcq"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/OpenListTeam/OpenList/commit/7b78fed106382430c69ef351d43f5d09928fff14"
46+
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/OpenListTeam/OpenList"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/OpenListTeam/OpenList/blob/5db2172ed681346b69ed468c73c1f01b6ed455ea/server/handles/fsmanage.go#L163-L164"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/OpenListTeam/OpenList/blob/5db2172ed681346b69ed468c73c1f01b6ed455ea/server/handles/fsmanage.go#L284-L285"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://github.com/OpenListTeam/OpenList/releases/tag/v4.1.10"
62+
}
63+
],
64+
"database_specific": {
65+
"cwe_ids": [
66+
"CWE-22"
67+
],
68+
"severity": "HIGH",
69+
"github_reviewed": true,
70+
"github_reviewed_at": "2026-02-02T20:01:30Z",
71+
"nvd_published_at": null
72+
}
73+
}

0 commit comments

Comments
 (0)