Description
radare2 prior to 6.1.4 contains a path traversal vulnerability in its project notes handling that allows attackers to read or write files outside the configured project directory by importing a malicious .zrp archive containing a symlinked notes.txt file. Attackers can craft a .zrp archive with a symlinked notes.txt that bypasses directory confinement checks, allowing note operations to follow the symlink and access arbitrary files outside the dir.projects root directory.
Problem types
CWE-59: Improper Link Resolution Before File Access ('Link Following')
Product status
Any version before 4bcdee725ff0754ed721a98789c0af371c5f32a4
Any version before 6.1.4
Credits
Chia Min Jun Lennon
References
github.com/radareorg/radare2/pull/25831 (Pull Request)
github.com/...ommit/4bcdee725ff0754ed721a98789c0af371c5f32a4 (Patch Commit)
www.vulncheck.com/...roject-notes-path-traversal-via-symlink