Hello, 
    Based on the issues related to CVE-2023-7216, I would like to discuss with 
the Red Hat community. I have summarized my viewpoints from the previous emails 
and listed them as follows: 
    1.cpio maintainer does not consider this to be a CVE. The maintainer's 
response in the email was as follows: 
    > First of all, I would like to confirm with you, do you accept 
    > CVE-2023-7216? Is CVE-2023-7216 a bug or is it the default 
    > behavior of cpio software? 
    It is a normal behavior.  Please use the --no-absolute-filenames option to 
avoid it, if it is not desired. 
    In fact, as early as the discussions related to CVE-2015-1197, the 
maintainer shared his perspective on this vulnerability, stating that the 
phenomenon mentioned in CVE-2023-7216 is consistent with his expected behavior. 
His exact words were ??If it already contains symbolic links, some users expect 
that those links are followed because they have used symlinks to move part of 
the file system tree to somewhere else (perhaps a large file system).?? For 
more details, please refer to the following two links: 
https://www.openwall.com/lists/oss-security/2015/01/07/5  and 
https://www.openwall.com/lists/oss-security/2015/01/08/4 . 
    This is also described in the official cpio manual 
(https://www.gnu.org/software/cpio/manual/cpio.pdf ),  the exact words are:?? 
Extracting an archive requires a bit more thought. First of all, by default 
cpio extracts the files with exactly the same name as stored in the archive. 
That means that if the archive contains absolute paths, you will extract files 
to their absolute locations no matter what directory you??re in when running 
the command. You can instruct cpio to remove leading slashes using the 
??--no-absolute-filenames?? option. Nevertheless, the good practice is to 
always test the archive using cpio -t prior to extracting it.?? 
    Therefore, should the Red Hat community seriously consider marking 
CVE-2023-7216 as rejected on NVD? 
    2. I have also reproduced the POC you provided, and our results are as 
follows: 
    ?6?1 When the attacker does not have read and write permissions for the 
attack directory, this attack scenario cannot be carried out. 
    ``` root 
    [root@locathost /] ls -l |grep dirA 
    drwx----- 2 root root 4096 Mar 6 17:52 dirA 
    [root@locathost /]# 
    [root@locathost /]# 
    ``` 
 
    ```userA 
    [userA@Localhost ~]$ cpio -vt < trav.cpio 
    lrwxrwxrwx 1 root root 6 Mar 15:15 tmp -&gt; /dirA/ 
    -rw------ 1 root root 15 Mar 15:15 tmp/trav.txt 
    block 
    [userA@Localhost ~]$ cpio -i < trav.cpio 
    cpio: tmp/trav.txt: Cannot open: Permission denied 
    1 block 
    [userA@Localhost ~]$ 
    ``` 
    ?6?1 When there is already a file with the same name in the attack 
directory, cpio has a protection mechanism and cannot cause critical file 
overwrite. 
 
    ``` root 
    [root@localhost /]# cat /tmp/trav.txt 
    111 
    ```  
 
    ```userA :The content of tmp/trav.txt in the cpio is "TEST Traversal". 
    [userA@Localhost ~]$ cpio -vt < travsed.cpio 
    lrwxrwxrwx 1 root root 5 Feb 27 18:55 tmp -&gt; /tmp/ 
    -rw------- 1 root root 15 Feb 27 18:56 tmp/trav.txt 
    l block 
    [userA@Localhost ~]$ cpio -i< travsed.cpio 
    cpio: tmp/trav.txt not created: newer or same age version exists 
    1 block 
    ``` 
    Based on the reproduction results, I believe that even if this 
vulnerability is considered a CVE, its impact is limited. Why does it have a 
score of 8.8?  In comparison, CVE-2023-7207 has a score of only 4.8 
(https://nvd.nist.gov/vuln/detail/CVE-2023-7207 ). Both vulnerabilities 
leverage symbolic links for path traversal attacks, and the methods and effects 
of the attacks are the same. Why is there such a large discrepancy in the 
scores between the two CVEs? I look forward to your explanation and hope you 
can provide the basis for each CVSS score. 
    3. Also, I see that the Red Hat community does not intend to fix this CVE 
vulnerability (https://access.redhat.com/security/cve/cve-2023-7216 ). What are 
the subsequent mitigation measures? Currently, it seems that the community 
maintainer will not address this issue. Should the Red Hat community respect 
the maintainer's wishes and consider this an expected behavior by default, 
rather than treating it as a CVE vulnerability? 
    looking forward to your reply! Wish you a good day! 
Best regards, 
Peng

Reply via email to