{ "id": "CVE-2022-36065", "sourceIdentifier": "security-advisories@github.com", "published": "2022-09-06T21:15:08.760", "lastModified": "2023-07-21T20:52:53.347", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "GrowthBook is an open-source platform for feature flagging and A/B testing. With some self-hosted configurations in versions prior to 2022-08-29, attackers can register new accounts and upload files to arbitrary directories within the container. If the attacker uploads a Python script to the right location, they can execute arbitrary code within the container. To be affected, ALL of the following must be true: Self-hosted deployment (GrowthBook Cloud is unaffected); using local file uploads (as opposed to S3 or Google Cloud Storage); NODE_ENV set to a non-production value and JWT_SECRET set to an easily guessable string like `dev`. This issue is patched in commit 1a5edff8786d141161bf880c2fd9ccbe2850a264 (2022-08-29). As a workaround, set `JWT_SECRET` environment variable to a long random string. This will stop arbitrary file uploads, but the only way to stop attackers from registering accounts is by updating to the latest build." }, { "lang": "es", "value": "GrowthBook es una plataforma de c\u00f3digo abierto para el marcado de caracter\u00edsticas y las pruebas A/B. Con algunas configuraciones auto-alojadas en versiones anteriores al 29-08-2022, los atacantes pueden registrar nuevas cuentas y subir archivos a directorios arbitrarios dentro del contenedor. Si el atacante sube un script de Python a la ubicaci\u00f3n correcta, puede ejecutar c\u00f3digo arbitrario dentro del contenedor. Para ser afectado, TODO lo siguiente debe ser cierto: despliegue auto-alojado (GrowthBook Cloud no est\u00e1 afectado); el uso de cargas de archivos locales (en lugar de S3 o Google Cloud Storage); NODE_ENV establecido a un valor no de producci\u00f3n y JWT_SECRET establecido a una cadena f\u00e1cilmente adivinable como \"dev\". Este problema est\u00e1 parcheado en el commit 1a5edff8786d141161bf880c2fd9ccbe2850a264 (2022-08-29). Como mitigaci\u00f3n, establezca la variable de entorno \"JWT_SECRET\" a una cadena larga y aleatoria. Esto detendr\u00e1 la carga de archivos arbitrarios, pero la \u00fanica forma de evitar que los atacantes registren cuentas es actualizando a la \u00faltima versi\u00f3n.\n" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH" }, "exploitabilityScore": 1.6, "impactScore": 5.9 }, { "source": "security-advisories@github.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH" }, "exploitabilityScore": 1.6, "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-22" } ] }, { "source": "security-advisories@github.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-22" }, { "lang": "en", "value": "CWE-24" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:growthbook:growthbook:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.6.0", "matchCriteriaId": "3749527E-1CFE-4D57-93C5-663AF209209C" } ] } ] } ], "references": [ { "url": "https://github.com/growthbook/growthbook/commit/1a5edff8786d141161bf880c2fd9ccbe2850a264", "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://github.com/growthbook/growthbook/pull/487", "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ] }, { "url": "https://github.com/growthbook/growthbook/security/advisories/GHSA-j24q-55xh-wm4r", "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ] } ] }