Advisory

Directory traversal flaw exposing critical files fixed in Bazaar revision control system

Take action: If you are using Bazaar, coordinate with your team on how you can lock it down via network access controls, some form of extranet access like VPNs, or simply remove the version until a patch is available. Because it's really easy to extract your passwd file, and a lot of other local files - like an AWS config with secrets and tokens


Learn More

A security vulnerability, tracked as CVE-2024-40348 (CVSS score 7.5), has been identified in Bazaar version 1.4.3. The vulnerability has been actively exploited, with attackers accessing sensitive files such as /etc/passwd on compromised systems.

Bazaar (often referred to as "bzr") is a distributed version control system developed by Canonical Ltd. It is designed to support both distributed and client-server version control models,

The flaw, allows unauthenticated attackers to perform directory traversal attacks through the /api/swaggerui/static component, potentially exposing critical files like /etc/passwd

By crafting a request to a director traversal like  "/api/swaggerui/static/../../../../../../../../../../../../../../../../etc/passwd"  attackers can access to sensitive files, compromising system confidentiality.

No known patches or specific countermeasures available. Users are advised to implement very rigid access controls or remove Bazaar until a patch is available.

Directory traversal flaw exposing critical files fixed in Bazaar revision control system