Skip to content

Commit c690a6a

Browse files
1 parent 87f8dbc commit c690a6a

2 files changed

Lines changed: 103 additions & 5 deletions

File tree

Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-8g8j-r87h-p36x",
4+
"modified": "2026-02-26T22:50:37Z",
5+
"published": "2026-02-26T22:50:37Z",
6+
"aliases": [
7+
"CVE-2026-27965"
8+
],
9+
"summary": "Vitess users with backup storage access can gain unauthorized access to production deployment environments",
10+
"details": "### Impact\n\nAny user with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that arbitrary code is later executed when that backup is restored. This can be used to provide that attacker with unintended/unauthorized access to the production deployment environment — allowing them to access information available in that environment as well as run any additional arbitrary commands there.\n\n### Patches\nFixes are expected to be released with versions v23.0.3 and v22.0.4\nSee fix commit at https://github.com/vitessio/vitess/commit/4c0173293907af9cb942a6683c465c3f1e9fdb5c\n\n### Workarounds\n\nIf maintainers *intended* to use an external decompressor then they can always specify that decompressor command in the `--external-decompressor` flag value for `vttablet` and `vtbackup`. That then overrides any value specified in the manifest file.\n\nIf maintainers did *not intend* to use an external decompressor, nor an internal one, then they can specify a value such as `cat` or `tee` in the `--external-decompressor` flag value for `vttablet` and `vtbackup` to ensure that a harmless command is always used. \n\n### References\n\nUsers can read more about the issue here: https://github.com/vitessio/vitess/issues/19459",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "vitess.io/vitess"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "0.23.2"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/vitessio/vitess/security/advisories/GHSA-8g8j-r87h-p36x"
42+
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27965"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/vitessio/vitess/issues/19459"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/vitessio/vitess/pull/19460"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/vitessio/vitess/commit/4c0173293907af9cb942a6683c465c3f1e9fdb5c"
58+
},
59+
{
60+
"type": "PACKAGE",
61+
"url": "https://github.com/vitessio/vitess"
62+
}
63+
],
64+
"database_specific": {
65+
"cwe_ids": [
66+
"CWE-78"
67+
],
68+
"severity": "HIGH",
69+
"github_reviewed": true,
70+
"github_reviewed_at": "2026-02-26T22:50:37Z",
71+
"nvd_published_at": "2026-02-26T02:16:23Z"
72+
}
73+
}

advisories/unreviewed/2026/02/GHSA-xjhr-fm27-4hmx/GHSA-xjhr-fm27-4hmx.json renamed to advisories/github-reviewed/2026/02/GHSA-xjhr-fm27-4hmx/GHSA-xjhr-fm27-4hmx.json

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xjhr-fm27-4hmx",
4-
"modified": "2026-02-26T21:31:30Z",
4+
"modified": "2026-02-26T22:50:20Z",
55
"published": "2026-02-25T18:31:38Z",
66
"aliases": [
77
"CVE-2026-26717"
88
],
9-
"details": "An issue in OpenFUN Richie (LMS) in src/richie/apps/courses/api.py. The application used the non-constant time == operator for HMAC signature verification in the sync_course_run_from_request function. This allows remote attackers to forge valid signatures and bypass authentication by measuring response time discrepancies",
9+
"summary": "OpenFUN Richie Observable Timing Discrepancy in its sync_course_run_from_request function",
10+
"details": "An issue in OpenFUN Richie (LMS) in src/richie/apps/courses/api.py. The application used the non-constant time == operator for HMAC signature verification in the sync_course_run_from_request function. This allows remote attackers to forge valid signatures and bypass authentication by measuring response time discrepancies.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "richie"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "3.3.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -27,6 +48,10 @@
2748
"type": "WEB",
2849
"url": "https://github.com/Rickidevs/CVE-2026-26717"
2950
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/openfun/richie"
54+
},
3055
{
3156
"type": "WEB",
3257
"url": "https://medium.com/@ordogh/cve-2026-26717-hmac-timing-attack-in-openfun-richie-lms-f04377efe83d?postPublishedType=repub"
@@ -37,8 +62,8 @@
3762
"CWE-208"
3863
],
3964
"severity": "MODERATE",
40-
"github_reviewed": false,
41-
"github_reviewed_at": null,
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-02-26T22:50:20Z",
4267
"nvd_published_at": "2026-02-25T17:25:39Z"
4368
}
4469
}

0 commit comments

Comments
 (0)