Skip to content

Whitelist bypass in WhiteBeam 0.2.0-0.2.1

High
noproto published GHSA-3f8r-9483-pfxj May 8, 2021

Package

No package listed

Affected versions

0.2.0-0.2.1

Patched versions

0.2.2

Description

Impact

A user with local access to a server running WhiteBeam can bypass whitelisting functionality

Patches

This vulnerability was patched in WhiteBeam 0.2.2

Workarounds

N/A

References

The fopen/fopen64/truncate hooks (included in the Essential whitelist) allow a file to be truncated in the OpenFileDescriptor action prior to the VerifyCanWrite action. This allows arbitrary files to be truncated with sufficient privileges on Linux, including WhiteBeam startup files.

Further, the FORTIFY_SOURCE variants of libc functions, truncate64, and ftruncate64 may allow similar bypasses to be possible.

Special thanks to security researcher Lesley De Keyser for identifying this issue.

For more information

If you have any questions or comments about this advisory:

Severity

High

CVE ID

No known CVE

Weaknesses

No CWEs

Credits