Impact
OpenViking processes .ovpack files by extracting ZIP archives into a target directory. In versions 0.2.1 and earlier the implementation fails to sanitize archive member names, allowing a malicious ZIP to include traversal sequences, absolute paths, or drive prefixes. When the import routine extracts such entries, it can write files outside the intended import directory, potentially overwriting or creating any file the importing process can access, which may include configuration files or executables. This flaw enables an attacker to influence the integrity and availability of the system, and if the import runs with elevated privileges, to compromise the whole system.
Affected Systems
The vulnerability affects the Volcengine OpenViking product, specifically versions 0.2.1 and all earlier releases.
Risk and Exploitability
The flaw carries a CVSS score of 8.4, indicating high severity. The EPSS score is less than 1%, suggesting that exploitation is currently rare but still possible. It is not listed in the CISA Known Exploited Vulnerabilities catalog, but the attack vector—uploading a malicious .ovpack—can be performed in environments where users can import packages. A successful exploit would allow an attacker to write arbitrary files with the privileges of the importing process, which may include root or system-level rights.
OpenCVE Enrichment
Github GHSA