{
  "threat_severity" : "Important",
  "public_date" : "2018-07-11T00:00:00Z",
  "bugzilla" : {
    "description" : "yum-utils: reposync: improper path validation may lead to directory traversal",
    "id" : "1600221",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1600221"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.8",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-22",
  "details" : [ "A directory traversal issue was found in reposync, a part of yum-utils, where reposync fails to sanitize paths in remote repository configuration files. If an attacker controls a repository, they may be able to copy files outside of the destination directory on the targeted system via path traversal. If reposync is running with heightened privileges on a targeted system, this flaw could potentially result in system compromise via the overwriting of critical system files. Version 1.1.31 and older are believed to be affected.", "A directory traversal issue was found in reposync, a part of yum-utils, where reposync fails to sanitize paths in remote repository configuration files. If an attacker controls a repository, they may be able to copy files outside of the destination directory on the targeted system via path traversal. If reposync is running with heightened privileges on a targeted system, this flaw could potentially result in system compromise via the overwriting of critical system files." ],
  "statement" : "Red Hat Enterprise Virtualization includes reposync as a component from the base Enterprise Linux system. It is not used by virtualization or management components, and it is not generally useful to mirror untrusted repositories to either Hypervisor or Management Appliance. For Red Hat Enterprise Virtualization, this issue affects only unlikely configurations and thus is rated as Moderate.",
  "acknowledgement" : "Red Hat would like to thank Aaron Levy (Clover Network) and Jay Grizzard (Clover Network) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2018-07-30T00:00:00Z",
    "advisory" : "RHSA-2018:2284",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "yum-utils-0:1.1.30-42.el6_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2018-07-30T00:00:00Z",
    "advisory" : "RHSA-2018:2285",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "yum-utils-0:1.1.31-46.el7_5"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2018-09-04T00:00:00Z",
    "advisory" : "RHSA-2018:2626",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "imgbased-0:1.0.24-1.el7ev",
    "impact" : "moderate"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2018-09-04T00:00:00Z",
    "advisory" : "RHSA-2018:2626",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "redhat-release-virtualization-host-0:4.2-6.0.el7",
    "impact" : "moderate"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2018-09-04T00:00:00Z",
    "advisory" : "RHSA-2018:2626",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "redhat-virtualization-host-0:4.2-20180828.2.el7_5",
    "impact" : "moderate"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "yum-utils",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "dnf-plugins-core",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2018-10897\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-10897" ],
  "name" : "CVE-2018-10897",
  "csaw" : false
}