Control: retitle -1 nncp: CVE-2025-60020: path traversal attack

Hi,

On Sat, Sep 20, 2025 at 08:59:28AM -0500, John Goerzen wrote:
> Package: nncp
> Tags: security
> Severity: critical
> Version: 8.11.0-4+b4
> 
> -------------------- Start of forwarded message --------------------
> From: Eugene Medvedev <[email protected]>
> Subject: NNCP path traversal attack.
> 

> As it currently stands, NNCP is vulnerable to path traversal attacks with
> freq and file functions: Despite the requirement for both to supply full path
> in configuration, both types of packets will accept and act upon paths
> containing
> "..". Most obviously, this allows one to request any file NNCP has access to,
> like its own configuration file with the private keys in it.
> Likewise, a sent file can break out of the incoming directory in the same 
> manner
> and be written anywhere on the system that the user can write to.
> 
> The included patch is my take on dealing with this by by limiting path
> traversal to
> below the configured full path. It does nothing about, e.g., symlinks,
> and I'm not sure anything should be done about those.
> 
> I can't claim to understand the codebase sufficiently to have caught
> all the ways
> this can happen, however.

CVE-2025-60020 has been assigned for this issue.

Regards,
Salvatore

Reply via email to