PT-2026-25862 · Go · Github.Com/Ctfer-Io/Monitoring
Published
2026-03-16
·
Updated
2026-03-16
·
CVE-2026-32771
CVSS v4.0
8.3
| Vector | AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:L/SA:L |
The
sanitizeArchivePath function in pkg/extract/extract.go (lines 248–254) is vulnerable to a path traversal bypass due to a missing trailing path separator in the strings.HasPrefix check. A crafted tar archive can write files outside the intended destination directory when using the extractor CLI tool or the extract.DumpOTelCollector library function.Vulnerable Code
File:
pkg/extract/extract.go, lines 248–254func sanitizeArchivePath(d, t string) (v string, err error) { v = filepath.Join(d, t) if strings.HasPrefix(v, filepath.Clean(d)) { // ← missing trailing separator return v, nil } return "", fmt.Errorf("filepath is tainted: %s", t) }
The function is called at line 219 inside
untar, which is invoked by copyFromPod (line 205) during the Cold Extract data dump workflow.Root Cause
strings.HasPrefix(v, filepath.Clean(d)) does not append a trailing / to the directory prefix, causing a directory name prefix collision. If the destination is /home/user/extract-output and a tar entry is named ../extract-outputevil/pwned, the joined path /home/user/extract-outputevil/pwned passes the prefix check — it starts with /home/user/extract-output — even though it is entirely outside the intended directory.Steps to Reproduce
-
Deploy the monitoring stack with
. The OTEL Collector begins writing signal data (ColdExtract: true
,otel traces
,otel metrics
) to the shared PVC.otel logs -
Place the PoC tar on the PVC. Any pod with write access to the
PVC (or the compromised OTEL Collector itself) copies aReadWriteMany
into thepoc-path-traversal.tar
mount path. The archive contains three real-looking OTLP telemetry files alongside two crafted entries with path-traversal names./data/collector -
Run the extractor against the namespace:
extractor --namespace monitoring --pvc-name <signals-pvc-name> --directory /home/user/extract-output
- Observe the bypass.
processes the tar stream. For the malicious entries:untar
// entry name: ../extract-outputevil/poc-proof.txt filepath.Join("/home/user/extract-output", "../extract-outputevil/poc-proof.txt") => "/home/user/extract-outputevil/poc-proof.txt" strings.HasPrefix("/home/user/extract-outputevil/poc-proof.txt", "/home/user/extract-output") => true // BUG: prefix collision; file lands OUTSIDE target dir
Both malicious entries are written outside
/home/user/extract-output/. The three legitimate OTLP files land correctly inside it.Impact
Successful exploitation gives an attacker arbitrary file write on the machine running the extractor. Real-world primitives include:
- Overwriting
/~/.bashrc
/~/.zshrc
for RCE on next shell login~/.profile - Appending to
for persistent SSH backdoor~/.ssh/authorized keys - Dropping a malicious entry into
to hijack cluster access~/.kube/config - Writing crontab entries for persistent scheduled execution
The attack surface is widened by the default
ReadWriteMany PVC access mode, which means any pod in the cluster with the PVC mounted can inject the payload — not just the OTEL Collector itself.Fix
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Github.Com/Ctfer-Io/Monitoring