QID 981837

QID 981837: Go (go) Security Update for github.com/cloudflare/cloudflared (GHSA-hgwp-4vp4-qmm2)

In `cloudflared` versions < 2020.8.1 on Windows, if an administrator has started `cloudflared` and set it to read configuration files from a certain directory, an unprivileged user can exploit a misconfiguration in order to escalate privileges and execute system-level commands. The misconfiguration was due to the way that `cloudflared` reads its configuration file. One of the locations that `cloudflared` reads from (C:\etc\) is not a secure by default directory due to the fact that Windows does not enforce access controls on this directory without further controls applied. A malformed config.yaml file can be written by any user. Upon reading this config, `cloudflared` would output an error message to a log file defined in the malformed config. The user-controlled log file location could be set to a specific location that Windows will execute when any user logs in.

Successful exploitation of this vulnerability may affect the confidentiality, integrity, and availability of the targeted user.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as Medium - 4.6 severity.
  • Solution
    Customers are advised to refer to GHSA-hgwp-4vp4-qmm2 for updates pertaining to this vulnerability.
    Vendor References

    CVEs related to QID 981837

    Software Advisories
    Advisory ID Software Component Link
    GHSA-hgwp-4vp4-qmm2 github.com/cloudflare/cloudflared URL Logo github.com/advisories/GHSA-hgwp-4vp4-qmm2