CVE-2023-43116:
Buildkite Elastic CI for AWS symbolic link following vulnerability
7.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.26825%
CWE
Published
12/22/2023
Updated
1/3/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/buildkite/elastic-ci-stack-for-aws/v6 | go | < 6.7.0 | 6.7.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the script's handling of the PIPELINE_PATH variable. The pre-patch code (shown in the diff) directly executed '/bin/chown -R' on the constructed path without checking for symlinks. The patch added critical validations: 1) realpath check to prevent symlink resolution, 2) directory existence check, and 3) early exit for non-existent paths. The vulnerable code path was the unconditional chown execution after basic existence check, which didn't account for symlink manipulation. The script's sudo permissions made this particularly dangerous as it could be exploited for privilege escalation.