CVE-2024-56514: Karmada Tar Slips in CRDs archive extraction
5.3
CVSS Score
4.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.44797%
CWE
Published
1/3/2025
Updated
1/3/2025
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/karmada-io/karmada | go | < 1.12.0 | 1.12.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure tar extraction in two components:
- In karmadactl's prepareCRD function, CRD tarballs were decompressed using utils.DeCompress() without validating file paths, making it susceptible to directory traversal attacks. The patch added validation.ValidateTarball() before extraction.
- In karmada-operator's runUnpack function, CRD tarballs were unpacked with util.Unpack() without path validation. The fix introduced validation checks before unpacking. Both functions lacked path sanitization and allowed '../' sequences in tar entries to escape the target directory, leading to arbitrary file writes. The confidence is high as the patches directly address these functions by adding validation logic.