CVE-2023-32322
Published on: Not Yet Published
Last Modified on: 05/26/2023 01:51:00 PM UTC
Certain versions of Ombi from Ombi contain the following vulnerability:
Ombi is an open source application which allows users to request specific media from popular self-hosted streaming servers. Versions prior to 4.38.2 contain an arbitrary file read vulnerability where an Ombi administrative user may access files available to the Ombi server process on the host operating system. Ombi administrators may not always be local system administrators and so this may violate the security expectations of the system. The arbitrary file read vulnerability was present in `ReadLogFile` and `Download` endpoints in `SystemControllers.cs` as the parameter `logFileName` is not sanitized before being combined with the `Logs` directory. When using `Path.Combine(arg1, arg2, arg3)`, an attacker may be able to escape to folders/files outside of `Path.Combine(arg1, arg2)` by using ".." in `arg3`. In addition, by specifying an absolute path for `arg3`, `Path.Combine` will completely ignore the first two arguments and just return just `arg3`. This vulnerability can lead to information disclosure. The Ombi `documentation` suggests running Ombi as a Service with Administrator privileges. An attacker targeting such an application may be able to read the files of any Windows user on the host machine and certain system files. This issue has been addressed in commit `b8a8f029` and in release version 4.38.2. Users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GHSL-2023-088.
- CVE-2023-32322 has been assigned by
security-adviso[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
Ombi-app - Ombi version = < 4.38.2
CVSS3 Score: 4.9 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | HIGH | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
GitHub Security Lab (GHSL) Vulnerability Report, Ombi: GHSL-2023-088 · Advisory · Ombi-app/Ombi · GitHub | github.com text/html |
![]() |
Ombi/SystemController.cs at v4.36.1 · Ombi-app/Ombi · GitHub | github.com text/html |
![]() |
Installation - Ombi Docs | docs.ombi.app text/html |
![]() |
Merge pull request from GHSA-28j3-84m7-gpjp · Ombi-app/Ombi@b8a8f02 · GitHub | github.com text/html |
![]() |
Ombi/SystemController.cs at v4.36.1 · Ombi-app/Ombi · GitHub | github.com text/html |
![]() |
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Ombi | Ombi | All | All | All | All |
- cpe:2.3:a:ombi:ombi:*:*:*:*:*:*:*:*:
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-32322 : Ombi is an open source application which allows users to request specific media from popular self-… twitter.com/i/web/status/1… | 2023-05-18 17:02:59 |