CVE-2024-0406
Datadog Agent vulnerability analysis and mitigation

Overview

A path traversal vulnerability was discovered in the mholt/archiver package (version 3), identified as CVE-2024-0406. The vulnerability allows attackers to create specially crafted tar files that, when unpacked, can enable access to restricted files or directories. This security flaw was discovered by Stefan Cornelius from Red Hat and has been assigned a CVSS v3 base score of 6.1, indicating a moderate severity level (Red Hat CVE).

Technical details

The vulnerability is classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), commonly known as Path Traversal. When exploited, it allows the creation or overwriting of files with the user's or application's privileges using the library. The vulnerability affects version 3 of the mholt/archiver package, while version 4 is not affected as it doesn't support this functionality. The CVSS vector for this vulnerability is CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N, indicating local attack vector, low attack complexity, no privileges required, and user interaction required (Red Hat CVE, Bugzilla Report).

Impact

The vulnerability can lead to multiple security impacts. An attacker can potentially create or overwrite critical files such as programs, libraries, or important data. If the targeted file is used for a security mechanism, the attacker may bypass that mechanism. Additionally, the vulnerability allows reading the contents of unexpected files and exposing sensitive data. In terms of availability, it may enable attackers to overwrite, delete, or corrupt critical files, potentially preventing the product from functioning correctly (Red Hat CVE).

Mitigation and workarounds

The primary mitigation strategy is to upgrade to mholt/archiver version 4, which is not affected by this vulnerability as it doesn't support the problematic functionality. For systems that cannot be immediately upgraded, careful validation of archive contents before unpacking is recommended (Bugzilla Report).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management