CVE-2023-32322

Published on: Not Yet Published

Last Modified on: 05/26/2023 01:51:00 PM UTC

CVE-2023-32322 - advisory for GHSA-28j3-84m7-gpjp

Source: Mitre Source: NIST CVE.ORG Print: PDF PDF
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Certain versions of Ombi from Ombi contain the following vulnerability:

Ombi is an open source application which allows users to request specific media from popular self-hosted streaming servers. Versions prior to 4.38.2 contain an arbitrary file read vulnerability where an Ombi administrative user may access files available to the Ombi server process on the host operating system. Ombi administrators may not always be local system administrators and so this may violate the security expectations of the system. The arbitrary file read vulnerability was present in `ReadLogFile` and `Download` endpoints in `SystemControllers.cs` as the parameter `logFileName` is not sanitized before being combined with the `Logs` directory. When using `Path.Combine(arg1, arg2, arg3)`, an attacker may be able to escape to folders/files outside of `Path.Combine(arg1, arg2)` by using ".." in `arg3`. In addition, by specifying an absolute path for `arg3`, `Path.Combine` will completely ignore the first two arguments and just return just `arg3`. This vulnerability can lead to information disclosure. The Ombi `documentation` suggests running Ombi as a Service with Administrator privileges. An attacker targeting such an application may be able to read the files of any Windows user on the host machine and certain system files. This issue has been addressed in commit `b8a8f029` and in release version 4.38.2. Users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GHSL-2023-088.

  • CVE-2023-32322 has been assigned by URL Logo security-adviso[email protected] to track the vulnerability - currently rated as MEDIUM severity.
  • Affected Vendor/Software: URL Logo Ombi-app - Ombi version = < 4.38.2

CVSS3 Score: 4.9 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW HIGH NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH NONE NONE

CVE References

Description Tags Link
GitHub Security Lab (GHSL) Vulnerability Report, Ombi: GHSL-2023-088 · Advisory · Ombi-app/Ombi · GitHub github.com
text/html
URL Logo MISC github.com/Ombi-app/Ombi/security/advisories/GHSA-28j3-84m7-gpjp
Ombi/SystemController.cs at v4.36.1 · Ombi-app/Ombi · GitHub github.com
text/html
URL Logo MISC github.com/Ombi-app/Ombi/blob/v4.36.1/src/Ombi/Controllers/V2/SystemController.cs#L46
Installation - Ombi Docs docs.ombi.app
text/html
URL Logo MISC docs.ombi.app/guides/installation/#windows
Merge pull request from GHSA-28j3-84m7-gpjp · Ombi-app/Ombi@b8a8f02 · GitHub github.com
text/html
URL Logo MISC github.com/Ombi-app/Ombi/commit/b8a8f029d80454d582bc4a2a05175106809335d0
Ombi/SystemController.cs at v4.36.1 · Ombi-app/Ombi · GitHub github.com
text/html
URL Logo MISC github.com/Ombi-app/Ombi/blob/v4.36.1/src/Ombi/Controllers/V2/SystemController.cs#L58

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationOmbiOmbiAllAllAllAll
  • cpe:2.3:a:ombi:ombi:*:*:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @CVEreport CVE-2023-32322 : Ombi is an open source application which allows users to request specific media from popular self-… twitter.com/i/web/status/1… 2023-05-18 17:02:59
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report