Home

Description

Opal is OBiBa’s core database application for biobanks or epidemiological studies. Prior to version 5.1.1, when copying any parent directory to a folder in the /temp/ directory, all files in that parent directory are copied, including files which the user should not have access to. All users of the application are impacted, as this is exploitable by any user to reveal all files in the opal filesystem. This also means that low-privilege users such as DataShield users can retrieve the files of other users. Version 5.1.1 contains a patch for the issue.

PUBLISHED Reserved 2025-02-18 | Published 2025-03-11 | Updated 2025-03-12 | Assigner GitHub_M




HIGH: 7.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 5.1.1
affected

References

github.com/...a/opal/security/advisories/GHSA-rxmx-gqjj-vhv8 exploit

github.com/...a/opal/security/advisories/GHSA-rxmx-gqjj-vhv8

github.com/...ommit/fca7dc9c8348064741b2e8b2c31b66660a935743

cve.org (CVE-2025-27101)

nvd.nist.gov (CVE-2025-27101)

Download JSON