8.2 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): LOW
- Availability impact (A): NONE
Activity log
- Created suggestion
REVA Public Link Exploit
REVA is an interoperability platform. Prior to 2.42.3 and 2.40.3, a bug in the GRPC authorization middleware of the "Reva" component of OpenCloud allows a malicious user to bypass the scope verification of a public link. By exploiting this via the the "archiver" service this can be leveraged to create an archive (zip or tar-file) containing all resources that this creator of the public link has access to. This vulnerability is fixed in 2.42.3 and 2.40.3.
References
Affected products
- ==< 2.40.3
- ==>= 2.41.0, < 2.42.3
Matching in nixpkgs
pkgs.revanced-cli
Command line application as an alternative to the ReVanced Manager
pkgs.sbclPackages.cl-prevalence
None
-
nixos-unstable 20230214-git
- nixpkgs-unstable 20250622-git
- nixos-unstable-small 20250622-git
-
nixos-25.11 20250622-git
- nixpkgs-25.11-darwin 20250622-git
Package maintainers
-
@jopejoe1 jopejoe1 <nixpkgs@missing.ninja>
-
@nagy Daniel Nagy <danielnagy@posteo.de>
-
@hraban Hraban Luyat <hraban@0brg.net>
-
@7c6f434c Michael Raskin <7c6f434c@mail.ru>
-
@Uthar Kasper Gałkowski <galkowskikasper@gmail.com>
-
@lukego Luke Gorrie <luke@snabb.co>