
=====================================================================

                                CERT-Renater

                    Note d'Information No. 2022/VULN418

_____________________________________________________________________

DATE                : 10/11/2022

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apache Ivy versions prior to
                                     2.5.1.

=====================================================================
https://lists.apache.org/thread/dr9q41jyq2rvxomnfd42z6qxnkfyyb4f
https://lists.apache.org/thread/or42p9z4ddch7pbkpcnctokzj6fzm7kl
_____________________________________________________________________

CVE-2022-37866: Apache Ivy: Ivy Path traversal


Severity: medium


Description:

When Apache Ivy downloads artifacts from a repository it stores them in
the local file system based on a user-supplied "pattern" that may
include placeholders for artifacts coordinates like the organisation,
module or version.

If said coordinates contain "../" sequences - which are valid characters
for Ivy coordinates in general - it is possible the artifacts are stored
outside of Ivy's local cache or repository or can overwrite different
artifacts inside of the local cache.

In order to exploit this vulnerability an attacker needs collaboration
by the remote repository as Ivy will issue http requests containing ".."
sequences and a "normal" repository will not interpret them as part of
the artifact coordinates.


Mitigation:

Users of Apache Ivy 2.0.0 to 2.5.1 should upgrade to Ivy 2.5.1.


Credit:

This issue was discovered by Kostya Kortchinsky of the Databricks 
Security Team.

_____________________________________________________________________

CVE-2022-37865: Apache Ivy allow create/overwrite any file on the system

Severity: medium

Description:

With Apache Ivy 2.4.0 an optional packaging attribute has been
introduced that allows artifacts to be unpacked on the fly if they used
pack200 or zip packaging.

For artifacts using the "zip", "jar" or "war" packaging Ivy prior to
2.5.1 doesn't verify the target path when extracting the archive. An
archive containing absolute paths or paths that try to traverse
"upwards" using ".." sequences can then write files to any location on
the local fie system that the user executing Ivy has write access to.


Mitigation:

Ivy users of version 2.4.0 to 2.5.0 should upgrade to Ivy 2.5.1.


Credit:

This issue was discovered by Kostya Kortchinsky of the Databricks
Security Team.


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================

