A directory traversal issue was found in reposync, a part of yum-utils, where reposync fails to sanitize paths in remote repository configuration files. If an attacker controls a repository, they may be able to copy files outside of the destination directory on the targeted system via path traversal. If reposync is running with heightened privileges on a targeted system, this flaw could potentially result in system compromise via the overwriting of critical system files.
Find out more about CVE-2018-10897 from the MITRE CVE dictionary dictionary and NIST NVD.
Red Hat Enterprise Virtualization includes reposync as a component from the base Enterprise Linux system. It is not used by virtualization or management components, and it is not generally useful to mirror untrusted repositories to either Hypervisor or Management Appliance. For Red Hat Enterprise Virtualization, this issue affects only unlikely configurations and thus is rated as Moderate.
CVSS3 Base Score | 8.8 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity Impact | High |
Availability Impact | High |
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 7 (yum-utils) | RHSA-2018:2285 | 2018-07-30 |
Red Hat Enterprise Linux 6 (yum-utils) | RHSA-2018:2284 | 2018-07-30 |
Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts | RHSA-2018:2626 | 2018-09-04 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 5 | yum-utils | Will not fix |