Impact
There is no validation during the import process of a project or task backup to check that the filename specified in the query parameter refers to a TUS-uploaded file belonging to the same user. As a result, if an attacker with a CVAT account and a user role knows the filenames of other users' uploads, they could potentially access and steal data by creating projects or tasks using those files.
This issue does not affect annotation or dataset TUS uploads, since in this case object-specific temporary directories are used.
Patches
Upgrade to CVAT 2.40.0 or a later version.
Workarounds
N/A
References
Fix commit: dbafd9c
Impact
There is no validation during the import process of a project or task backup to check that the filename specified in the query parameter refers to a TUS-uploaded file belonging to the same user. As a result, if an attacker with a CVAT account and a
userrole knows the filenames of other users' uploads, they could potentially access and steal data by creating projects or tasks using those files.This issue does not affect annotation or dataset TUS uploads, since in this case object-specific temporary directories are used.
Patches
Upgrade to CVAT 2.40.0 or a later version.
Workarounds
N/A
References
Fix commit: dbafd9c