Miggo Logo

GHSA-65pc-76pq-pvf5: Duplicate Advisory: Pebble service manager's file pull API allows access by any user

6.5

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
4/4/2024
Updated
4/5/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/canonical/pebblego< 1.1.11.1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability centers around Pebble's file read API endpoint (GET /v1/files?action=read) and its corresponding CLI command. Analysis of advisory details shows:

  1. The core issue was missing authorization checks in the API handler (serveRead) that should have restricted access to admin users
  2. The cmdPull command directly interacts with this vulnerable API
  3. Security patches added user authorization validation in these components
  4. Runtime exploitation would show these functions in call stacks when unprivileged users access protected files
  5. Function names follow Go's package structure conventions observed in Pebble's codebase

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## *upli**t* **visory T*is **visory **s ***n wit**r*wn ****us* it is * *upli**t* o* **S*-****-*x*r-**pj. T*is link is m*int*in** to pr*s*rv* *xt*rn*l r***r*n**s. ## Ori*in*l **s*ription It w*s *is*ov*r** t**t P***l*'s r***-*il* *PI *n* t** *sso*i*t*

Reasoning

T** vuln*r**ility **nt*rs *roun* P***l*'s *il* r*** *PI *n*point (**T /v*/*il*s?**tion=r***) *n* its *orr*spon*in* *LI *omm*n*. *n*lysis o* **visory **t*ils s*ows: *. T** *or* issu* w*s missin* *ut*oriz*tion ****ks in t** *PI **n*l*r (s*rv*R***) t**t