icon

We found results for “

CVE-2024-39897

Date: July 9, 2024

zot is an OCI image registry. Prior to 2.1.0, the cache driver "GetBlob()" allows read access to any blob without access control check. If a Zot "accessControl" policy allows users read access to some repositories but restricts read access to other repositories and "dedupe" is enabled (it is enabled by default), then an attacker who knows the name of an image and the digest of a blob (that they do not have read access to), they may maliciously read it via a second repository they do have read access to. This attack is possible because ""ImageStore.CheckBlob()" calls "checkCacheBlob()"" (https://github.com/project-zot/zot/blob/v2.1.0-rc2/pkg/storage/imagestore/imagestore.go#L1158-L1159) to find the blob a global cache by searching for the digest. If it is found, it is copied to the user requested repository with "copyBlob()". The attack may be mitigated by configuring "dedupe": false in the "storage" settings. The vulnerability is fixed in 2.1.0.

Language: Go

Severity Score

Severity Score

Weakness Type (CWE)

Authorization Bypass Through User-Controlled Key

CWE-639

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us