Skip to content

Commit dff2477

Browse files
author
cvelistV5 Github Action
committed
1 changes (1 new | 0 updated):
- 1 new CVEs: CVE-2026-32147 - 0 updated CVEs:
1 parent a392dc2 commit dff2477

3 files changed

Lines changed: 295 additions & 34 deletions

File tree

Lines changed: 274 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,274 @@
1+
{
2+
"dataType": "CVE_RECORD",
3+
"dataVersion": "5.2",
4+
"cveMetadata": {
5+
"cveId": "CVE-2026-32147",
6+
"assignerOrgId": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
7+
"state": "PUBLISHED",
8+
"assignerShortName": "EEF",
9+
"dateReserved": "2026-03-10T22:37:29.213Z",
10+
"datePublished": "2026-04-21T12:01:20.350Z",
11+
"dateUpdated": "2026-04-21T12:01:20.350Z"
12+
},
13+
"containers": {
14+
"cna": {
15+
"affected": [
16+
{
17+
"cpes": [
18+
"cpe:2.3:a:erlang:erlang\\/otp:*:*:*:*:*:*:*:*"
19+
],
20+
"defaultStatus": "unknown",
21+
"modules": [
22+
"ssh_sftpd"
23+
],
24+
"packageName": "ssh",
25+
"packageURL": "pkg:otp/ssh?repository_url=https:%2F%2Fgithub.com%2Ferlang%2Fotp&vcs_url=git%20https:%2F%2Fgithub.com%2Ferlang%2Fotp.git",
26+
"product": "OTP",
27+
"programFiles": [
28+
"src/ssh_sftpd.erl"
29+
],
30+
"programRoutines": [
31+
{
32+
"name": "ssh_sftpd:do_open/4"
33+
},
34+
{
35+
"name": "ssh_sftpd:handle_op/4"
36+
}
37+
],
38+
"repo": "https://github.com/erlang/otp",
39+
"vendor": "Erlang",
40+
"versions": [
41+
{
42+
"changes": [
43+
{
44+
"at": "5.5.3",
45+
"status": "unaffected"
46+
},
47+
{
48+
"at": "5.2.11.7",
49+
"status": "unaffected"
50+
},
51+
{
52+
"at": "5.1.4.15",
53+
"status": "unaffected"
54+
}
55+
],
56+
"lessThan": "*",
57+
"status": "affected",
58+
"version": "3.01",
59+
"versionType": "otp"
60+
}
61+
]
62+
},
63+
{
64+
"collectionURL": "https://github.com",
65+
"cpes": [
66+
"cpe:2.3:a:erlang:erlang\\/otp:*:*:*:*:*:*:*:*"
67+
],
68+
"defaultStatus": "unknown",
69+
"modules": [
70+
"ssh_sftpd"
71+
],
72+
"packageName": "erlang/otp",
73+
"packageURL": "pkg:github/erlang/otp",
74+
"product": "OTP",
75+
"programFiles": [
76+
"lib/ssh/src/ssh_sftpd.erl"
77+
],
78+
"programRoutines": [
79+
{
80+
"name": "ssh_sftpd:do_open/4"
81+
},
82+
{
83+
"name": "ssh_sftpd:handle_op/4"
84+
}
85+
],
86+
"repo": "https://github.com/erlang/otp",
87+
"vendor": "Erlang",
88+
"versions": [
89+
{
90+
"changes": [
91+
{
92+
"at": "28.4.3",
93+
"status": "unaffected"
94+
},
95+
{
96+
"at": "27.3.4.11",
97+
"status": "unaffected"
98+
},
99+
{
100+
"at": "26.2.5.20",
101+
"status": "unaffected"
102+
}
103+
],
104+
"lessThan": "*",
105+
"status": "affected",
106+
"version": "17.0",
107+
"versionType": "otp"
108+
},
109+
{
110+
"changes": [
111+
{
112+
"at": "28c5d5a6c5f873dc701b597276271763e7d1c004",
113+
"status": "unaffected"
114+
}
115+
],
116+
"lessThan": "*",
117+
"status": "affected",
118+
"version": "07b8f441ca711f9812fad9e9115bab3c3aa92f79",
119+
"versionType": "git"
120+
}
121+
]
122+
}
123+
],
124+
"configurations": [
125+
{
126+
"lang": "en",
127+
"supportingMedia": [
128+
{
129+
"base64": false,
130+
"type": "text/html",
131+
"value": "The SFTP subsystem must be configured with the <tt>root</tt> option in <tt>ssh_sftpd:subsystem_spec/1</tt>. The <tt>root</tt> option is not set by default."
132+
}
133+
],
134+
"value": "The SFTP subsystem must be configured with the root option in ssh_sftpd:subsystem_spec/1. The root option is not set by default."
135+
}
136+
],
137+
"credits": [
138+
{
139+
"lang": "en",
140+
"type": "finder",
141+
"value": "John Downey"
142+
},
143+
{
144+
"lang": "en",
145+
"type": "remediation developer",
146+
"value": "Michał Wąsowski"
147+
},
148+
{
149+
"lang": "en",
150+
"type": "remediation reviewer",
151+
"value": "Jakub Witczak"
152+
}
153+
],
154+
"descriptions": [
155+
{
156+
"lang": "en",
157+
"supportingMedia": [
158+
{
159+
"base64": false,
160+
"type": "text/html",
161+
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP <tt>ssh</tt> (<tt>ssh_sftpd</tt> module) allows an authenticated SFTP user to modify file attributes outside the configured chroot directory.<p>The SFTP daemon (<tt>ssh_sftpd</tt>) stores the raw, user-supplied path in file handles instead of the chroot-resolved path. When <tt>SSH_FXP_FSETSTAT</tt> is issued on such a handle, file attributes (permissions, ownership, timestamps) are modified on the real filesystem path, bypassing the root directory boundary entirely.</p><p>Any authenticated SFTP user on a server configured with the <tt>root</tt> option can modify file attributes of files outside the intended chroot boundary. The prerequisite is that a target file must exist on the real filesystem at the same relative path. Note that this vulnerability only allows modification of file attributes; file contents cannot be read or altered through this attack vector.</p><p>If the SSH daemon runs as <tt>root</tt>, this enables direct privilege escalation: an attacker can set the setuid bit on any binary, change ownership of sensitive files, or make system configuration world-writable.</p><p>This vulnerability is associated with program files <tt>lib/ssh/src/ssh_sftpd.erl</tt> and program routines <tt>ssh_sftpd:do_open/4</tt> and <tt>ssh_sftpd:handle_op/4</tt>.</p><p>This issue affects OTP from OTP 17.0 until OTP 28.4.3, 27.3.4.11, and 26.2.5.20 corresponding to <tt>ssh</tt> from 3.01 until 5.5.3, 5.2.11.7, and 5.1.4.15.</p>"
162+
}
163+
],
164+
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP ssh (ssh_sftpd module) allows an authenticated SFTP user to modify file attributes outside the configured chroot directory.\n\nThe SFTP daemon (ssh_sftpd) stores the raw, user-supplied path in file handles instead of the chroot-resolved path. When SSH_FXP_FSETSTAT is issued on such a handle, file attributes (permissions, ownership, timestamps) are modified on the real filesystem path, bypassing the root directory boundary entirely.\n\nAny authenticated SFTP user on a server configured with the root option can modify file attributes of files outside the intended chroot boundary. The prerequisite is that a target file must exist on the real filesystem at the same relative path. Note that this vulnerability only allows modification of file attributes; file contents cannot be read or altered through this attack vector.\n\nIf the SSH daemon runs as root, this enables direct privilege escalation: an attacker can set the setuid bit on any binary, change ownership of sensitive files, or make system configuration world-writable.\n\nThis vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl and program routines ssh_sftpd:do_open/4 and ssh_sftpd:handle_op/4.\n\nThis issue affects OTP from OTP 17.0 until OTP 28.4.3, 27.3.4.11, and 26.2.5.20 corresponding to ssh from 3.01 until 5.5.3, 5.2.11.7, and 5.1.4.15."
165+
}
166+
],
167+
"metrics": [
168+
{
169+
"cvssV4_0": {
170+
"Automatable": "NOT_DEFINED",
171+
"Recovery": "NOT_DEFINED",
172+
"Safety": "NOT_DEFINED",
173+
"attackComplexity": "LOW",
174+
"attackRequirements": "NONE",
175+
"attackVector": "NETWORK",
176+
"baseScore": 5.3,
177+
"baseSeverity": "MEDIUM",
178+
"exploitMaturity": "NOT_DEFINED",
179+
"privilegesRequired": "LOW",
180+
"providerUrgency": "NOT_DEFINED",
181+
"subAvailabilityImpact": "NONE",
182+
"subConfidentialityImpact": "NONE",
183+
"subIntegrityImpact": "LOW",
184+
"userInteraction": "NONE",
185+
"valueDensity": "NOT_DEFINED",
186+
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N",
187+
"version": "4.0",
188+
"vulnAvailabilityImpact": "NONE",
189+
"vulnConfidentialityImpact": "NONE",
190+
"vulnIntegrityImpact": "LOW",
191+
"vulnerabilityResponseEffort": "NOT_DEFINED"
192+
},
193+
"format": "CVSS",
194+
"scenarios": [
195+
{
196+
"lang": "en",
197+
"value": "GENERAL"
198+
}
199+
]
200+
}
201+
],
202+
"problemTypes": [
203+
{
204+
"descriptions": [
205+
{
206+
"cweId": "CWE-22",
207+
"description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
208+
"lang": "en",
209+
"type": "CWE"
210+
}
211+
]
212+
}
213+
],
214+
"providerMetadata": {
215+
"orgId": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
216+
"shortName": "EEF",
217+
"dateUpdated": "2026-04-21T12:01:20.350Z"
218+
},
219+
"references": [
220+
{
221+
"tags": [
222+
"vendor-advisory",
223+
"related"
224+
],
225+
"url": "https://github.com/erlang/otp/security/advisories/GHSA-28jg-mw9x-hpm5"
226+
},
227+
{
228+
"tags": [
229+
"related"
230+
],
231+
"url": "https://cna.erlef.org/cves/CVE-2026-32147.html"
232+
},
233+
{
234+
"tags": [
235+
"related"
236+
],
237+
"url": "https://osv.dev/vulnerability/EEF-CVE-2026-32147"
238+
},
239+
{
240+
"tags": [
241+
"x_version-scheme"
242+
],
243+
"url": "https://www.erlang.org/doc/system/versions.html#order-of-versions"
244+
},
245+
{
246+
"tags": [
247+
"patch"
248+
],
249+
"url": "https://github.com/erlang/otp/commit/28c5d5a6c5f873dc701b597276271763e7d1c004"
250+
}
251+
],
252+
"source": {
253+
"discovery": "EXTERNAL"
254+
},
255+
"title": "SFTP chroot bypass via path traversal in SSH_FXP_FSETSTAT",
256+
"workarounds": [
257+
{
258+
"lang": "en",
259+
"supportingMedia": [
260+
{
261+
"base64": false,
262+
"type": "text/html",
263+
"value": "<ul><li>Do not use the <tt>root</tt> option in <tt>ssh_sftpd:subsystem_spec/1</tt>, and instead rely on OS-level chroot or container isolation to confine SFTP users.</li><li>Ensure the Erlang VM is not running as a privileged OS user. Running the VM as an unprivileged user limits the impact of this vulnerability, since attribute modifications are constrained by that user's OS-level permissions.</li></ul>"
264+
}
265+
],
266+
"value": "* Do not use the root option in ssh_sftpd:subsystem_spec/1, and instead rely on OS-level chroot or container isolation to confine SFTP users.\n* Ensure the Erlang VM is not running as a privileged OS user. Running the VM as an unprivileged user limits the impact of this vulnerability, since attribute modifications are constrained by that user's OS-level permissions."
267+
}
268+
],
269+
"x_generator": {
270+
"engine": "Vulnogram 0.2.0"
271+
}
272+
}
273+
}
274+
}

cves/delta.json

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
{
2-
"fetchTime": "2026-04-21T11:11:49.138Z",
2+
"fetchTime": "2026-04-21T12:02:50.840Z",
33
"numberOfChanges": 1,
4-
"new": [],
5-
"updated": [
4+
"new": [
65
{
7-
"cveId": "CVE-2026-39659",
8-
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2026-39659",
9-
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2026/39xxx/CVE-2026-39659.json",
10-
"dateUpdated": "2026-04-21T10:53:33.975Z"
6+
"cveId": "CVE-2026-32147",
7+
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2026-32147",
8+
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2026/32xxx/CVE-2026-32147.json",
9+
"dateUpdated": "2026-04-21T12:01:20.350Z"
1110
}
1211
],
12+
"updated": [],
1313
"error": []
1414
}

cves/deltaLog.json

Lines changed: 14 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,18 @@
11
[
2+
{
3+
"fetchTime": "2026-04-21T12:02:50.840Z",
4+
"numberOfChanges": 1,
5+
"new": [
6+
{
7+
"cveId": "CVE-2026-32147",
8+
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2026-32147",
9+
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2026/32xxx/CVE-2026-32147.json",
10+
"dateUpdated": "2026-04-21T12:01:20.350Z"
11+
}
12+
],
13+
"updated": [],
14+
"error": []
15+
},
216
{
317
"fetchTime": "2026-04-21T11:11:49.138Z",
418
"numberOfChanges": 1,
@@ -245509,32 +245523,5 @@
245509245523
}
245510245524
],
245511245525
"error": []
245512-
},
245513-
{
245514-
"fetchTime": "2026-03-22T11:22:39.189Z",
245515-
"numberOfChanges": 3,
245516-
"new": [
245517-
{
245518-
"cveId": "CVE-2026-4545",
245519-
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2026-4545",
245520-
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2026/4xxx/CVE-2026-4545.json",
245521-
"dateUpdated": "2026-03-22T11:20:57.774Z"
245522-
}
245523-
],
245524-
"updated": [
245525-
{
245526-
"cveId": "CVE-2024-1394",
245527-
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-1394",
245528-
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/1xxx/CVE-2024-1394.json",
245529-
"dateUpdated": "2026-03-22T11:11:08.061Z"
245530-
},
245531-
{
245532-
"cveId": "CVE-2025-7195",
245533-
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2025-7195",
245534-
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2025/7xxx/CVE-2025-7195.json",
245535-
"dateUpdated": "2026-03-22T11:11:09.143Z"
245536-
}
245537-
],
245538-
"error": []
245539245526
}
245540245527
]

0 commit comments

Comments
 (0)