Description
Crabbox before 0.9.0 contains a path traversal vulnerability in the Islo provider's workspace path resolution that allows attackers to supply absolute or relative paths that resolve outside the intended /workspace directory. Attackers can craft a malicious .crabbox.yaml or crabbox.yaml file with traversal sequences to cause arbitrary file deletion and overwrite when sync.delete is enabled, as the workspace preparation logic executes rm -rf and mkdir -p operations on the resolved path without proper validation.
Problem types
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Any version before 0.9.0
6b07193fb5670aac315ea47215651c67b8127868 (git)
Credits
Chia Min Jun Lennon
References
github.com/openclaw/crabbox/releases/tag/v0.9.0
github.com/openclaw/crabbox/pull/65
github.com/...ommit/6b07193fb5670aac315ea47215651c67b8127868
www.vulncheck.com/...-via-islo-provider-workspace-resolution