Github.Com Cloudflare Cfrpki vulnerabilities

9 known vulnerabilities affecting github.com/cloudflare_cfrpki.

Total CVEs
9
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH4MEDIUM5

Vulnerabilities

Page 1 of 1
CVE-2022-3616MEDIUM≥ 0, < 1.4.42022-10-31
CVE-2022-3616 [MEDIUM] CWE-754 OctoRPKI crashes when max iterations is reached OctoRPKI crashes when max iterations is reached ### Impact Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability. ###
ghsaosv
CVE-2021-3978HIGH≥ 0, < 1.4.22021-11-19
CVE-2021-3978 [HIGH] CWE-269 Improper Preservation of Permissions in github.com/cloudflare/cfrpki/cmd/octorpki Improper Preservation of Permissions in github.com/cloudflare/cfrpki/cmd/octorpki ### Impact When copying files with rsync, octorpki uses the "-a" flag 0, which forces rsync to copy binaries with the suid bit set as root. Since the provided service definition defaults to root (https://github.com/cloudflare/cfrpki/blob/master/package/octorpki.service) this could allow for a vector, whe
ghsaosv
CVE-2021-3907HIGHCVSS 9.8≥ 0, < 1.4.42021-11-10
CVE-2021-3907 [HIGH] CWE-20 Arbitrary filepath traversal via URI injection Arbitrary filepath traversal via URI injection OctoRPKI does not escape a URI with a filename containing "..", this allows a repository to create a file, (ex. `rsync://example.org/repo/../../etc/cron.daily/evil.roa`), which would then be written to disk outside the base cache folder. This could allow for remote code execution on the host machine OctoRPKI is running on. ## Patches ## For more information If you have any
ghsaosv
CVE-2021-3910HIGH≥ 0, < 1.4.02021-11-10
CVE-2021-3910 [HIGH] CWE-20 NUL character in ROA causes OctoRPKI to crash NUL character in ROA causes OctoRPKI to crash OctoRPKI crashes when encountering a repository that returns an invalid ROA (just an encoded `NUL` (`\0`) character). ## Patches ## For more information If you have any questions or comments about this advisory email us at [email protected]
ghsaosv
CVE-2021-3908MEDIUM≥ 0, < 1.4.02021-11-10
CVE-2021-3908 [MEDIUM] CWE-400 Infinite certificate chain depth results in OctoRPKI running forever Infinite certificate chain depth results in OctoRPKI running forever OctoRPKI (github.com/cloudflare/cfrpki/cmd/octorpki) does not limit the depth of a certificate chain, allowing for a CA to create children in an ad-hoc fashion, thereby making tree traversal never end. ### For more information If you have any questions or comments about this advisory email us at [email protected]
ghsaosv
CVE-2021-3911MEDIUM≥ 0, < 1.4.02021-11-10
CVE-2021-3911 [MEDIUM] CWE-20 Misconfigured IP address field in ROA leads to OctoRPKI crash Misconfigured IP address field in ROA leads to OctoRPKI crash If the ROA that a repository returns contains too many bits for the IP address then OctoRPKI will crash. ## Patches ## For more information If you have any questions or comments about this advisory email us at [email protected]
ghsaosv
CVE-2021-3912MEDIUM≥ 0, < 1.4.02021-11-10
CVE-2021-3912 [MEDIUM] CWE-400 OctoRPKI crashes when processing GZIP bomb returned via malicious repository OctoRPKI crashes when processing GZIP bomb returned via malicious repository OctoRPKI tries to load the entire contents of a repository in memory, and in the case of a GZIP bomb, unzip it in memory, making it possible to create a repository that makes OctoRPKI run out of memory (and thus crash). ## Patches ## For more information If you have any questions or comments about this advisory
ghsaosv
CVE-2021-3909MEDIUM≥ 0, < 1.4.02021-11-10
CVE-2021-3909 [MEDIUM] CWE-400 Infinite open connection causes OctoRPKI to hang forever Infinite open connection causes OctoRPKI to hang forever OctoRPKI (github.com/cloudflare/cfrpki/cmd/octorpki) does not limit the length of a connection, allowing for a slowloris DOS attack to take place which makes OctoRPKI wait forever. Specifically, the repository that OctoRPKI sends HTTP requests to will keep the connection open for a day before a response is returned, but does keep drip feeding new bytes
ghsaosv
CVE-2021-3761HIGH≥ 0, < 1.3.02021-09-07
CVE-2021-3761 [HIGH] CWE-295 OctoRPKI lacks contextual out-of-bounds check when validating RPKI ROA maxLength values OctoRPKI lacks contextual out-of-bounds check when validating RPKI ROA maxLength values Any CA issuer in the RPKI can trick OctoRPKI prior to https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422 into emitting an invalid VRP "MaxLength" value, causing RTR sessions to terminate. ### Impact An attacker can use this to disable RPKI Origin Validation
ghsaosv