Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/fkie-cad/yapscan
  4. ›
  5. GMS-2022-9011

GMS-2022-9011: Yapscan's report receiver server vulnerable to path traversal and log injection

December 29, 2022 (updated March 31, 2023)

Impact

If you make use of the report receiver server (experimental), a client may be able to forge requests such that arbitrary files on the host can be overwritten (subject to permissions of the yapscan server), leading to loss of data. This is particularly problematic if you do not authenticate clients and/or run the server with elevated permissions.

Patches

Vulnerable versions:

  • v0.18.0
  • v0.19.0 (unreleased)

This problem is patched in version v0.19.1

Workarounds

Update to the newer version is highly encouraged!

Measures to reduce the risk of this include authenticating clients (see --client-ca flag) and containerization of the yapscan server.

References

The tracking issue is #35. There you can find the commits, fixing the issue.

References

  • github.com/advisories/GHSA-9h6h-9g78-86f7
  • github.com/fkie-cad/yapscan/issues/35
  • github.com/fkie-cad/yapscan/releases/tag/v0.19.1
  • github.com/fkie-cad/yapscan/security/advisories/GHSA-9h6h-9g78-86f7

Code Behaviors & Features

Detect and mitigate GMS-2022-9011 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.18.0 before 0.19.1

Fixed versions

  • 0.19.1

Solution

Upgrade to version 0.19.1 or above.

Source file

go/github.com/fkie-cad/yapscan/GMS-2022-9011.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:03 +0000.