Description
NanoClaw version 1.2.0 and prior contains a host/container filesystem boundary vulnerability in outbound attachment handling and outbox cleanup that allows a compromised or prompt-injected container to read files outside the intended outbox directory by supplying crafted messages_out.id and content.files values or creating symlinked outbox files. Attackers can exploit this vulnerability to trigger host-side reads of arbitrary files and in some cases achieve recursive deletion of paths outside the intended cleanup target.
Problem types
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
7814e45570edf0024a1a5c2ba9fbc9cb3a49f7f7 (git)
Any version
Credits
Chia Min Jun Lennon
References
github.com/qwibitai/nanoclaw/pull/2001
github.com/qwibitai/nanoclaw/pull/2001
github.com/...ommit/7814e45570edf0024a1a5c2ba9fbc9cb3a49f7f7
github.com/qwibitai/nanoclaw/releases/tag/v1.2.0