{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T06:44:34.232","vulnerabilities":[{"cve":{"id":"CVE-2026-26187","sourceIdentifier":"security-advisories@github.com","published":"2026-02-13T19:17:29.100","lastModified":"2026-02-18T21:32:15.033","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"lakeFS is an open-source tool that transforms object storage into a Git-like repositories. Prior to 1.77.0, the local block adapter (pkg/block/local/adapter.go) allows authenticated users to read and write files outside their designated storage boundaries. The verifyRelPath function used strings.HasPrefix() to verify that requested paths fall within the configured storage directory. This check was insufficient because it validated only the path prefix without requiring a path separator, allowing access to sibling directories with similar names. Also, the adapter verified that resolved paths stayed within the adapter's base path, but did not verify that object identifiers stayed within their designated storage namespace. This allowed attackers to use path traversal sequences in the object identifier to access files in other namespaces. Fixed in version v1.77.0."},{"lang":"es","value":"lakeFS es una herramienta de código abierto que transforma el almacenamiento de objetos en repositorios similares a Git. Antes de la versión 1.77.0, el adaptador de bloque local (pkg/block/local/adapter.go) permitía a los usuarios autenticados leer y escribir archivos fuera de sus límites de almacenamiento designados. La función verifyRelPath utilizaba strings.HasPrefix() para verificar que las rutas solicitadas estuvieran dentro del directorio de almacenamiento configurado. Esta verificación era insuficiente porque validaba solo el prefijo de la ruta sin requerir un separador de ruta, lo que permitía el acceso a directorios hermanos con nombres similares. Además, el adaptador verificaba que las rutas resueltas permanecieran dentro de la ruta base del adaptador, pero no verificaba que los identificadores de objeto permanecieran dentro de su espacio de nombres de almacenamiento designado. Esto permitía a los atacantes utilizar secuencias de salto de ruta en el identificador de objeto para acceder a archivos en otros espacios de nombres. Corregido en la versión v1.77.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lakefs:lakefs:*:*:*:*:*:*:*:*","versionEndExcluding":"1.77.0","matchCriteriaId":"F1A8EEB4-D5B5-419E-AFB3-DE354DB020F3"}]}]}],"references":[{"url":"https://github.com/treeverse/lakeFS/commit/cbc106275357302a834280f133265dc39f1384ce","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/treeverse/lakeFS/releases/tag/v1.77.0","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/treeverse/lakeFS/security/advisories/GHSA-699m-4v95-rmpm","source":"security-advisories@github.com","tags":["Mitigation","Vendor Advisory"]}]}}]}