Vigil@nce - QEMU: directory traversal via 9pfs
October 2016 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker, in a guest system, can traverse directories via 9pfs
of QEMU, in order to read a file on the host system.
Impacted products: Debian, Fedora, openSUSE Leap, QEMU, SUSE Linux
Enterprise Desktop, SLES.
Severity: 2/4.
Creation date: 30/08/2016.
DESCRIPTION OF THE VULNERABILITY
The QEMU product can share files via 9pfs (Plan 9 File System).
However, user’s data are directly inserted in an access path.
Sequences such as "/.." can thus be used to go in the upper
directory.
An attacker, in a guest system, can therefore traverse directories
via 9pfs of QEMU, in order to read a file on the host system.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/QEMU-directory-traversal-via-9pfs-20487