Skip to content

Commit 6ed954e

Browse files
1 parent b8794d3 commit 6ed954e

File tree

2 files changed

+5
-4
lines changed

2 files changed

+5
-4
lines changed

advisories/github-reviewed/2026/02/GHSA-6c9j-x93c-rw6j/GHSA-6c9j-x93c-rw6j.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6c9j-x93c-rw6j",
4-
"modified": "2026-02-19T22:06:26Z",
4+
"modified": "2026-02-27T21:55:45Z",
55
"published": "2026-02-19T22:06:26Z",
66
"aliases": [],
77
"summary": "OpenClaw safeBins file-existence oracle information disclosure",
8-
"details": "An information disclosure vulnerability in OpenClaw's `tools.exec.safeBins` approval flow allowed a file-existence oracle.\n\nWhen safe-bin validation examined candidate file paths, command allow/deny behavior could differ based on whether a path already existed on the host filesystem. An attacker could probe for file presence by comparing outcomes for existing vs non-existing filenames.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Affected versions: `<= 2026.2.17`\n- Latest published vulnerable version at triage time: `2026.2.17`\n- Planned patched version: `2026.2.19`\n\n## Impact\nAttackers with access to this execution surface could infer whether specific files exist (for example secrets/config files), enabling filesystem enumeration and improving follow-on attack planning.\n\n## Fix\nThe safe-bin policy was changed to deterministic argv-only validation without host file-existence checks. File-oriented flags are blocked for safe-bin mode (for example `sort -o`, `jq -f`, `grep -f`), and trusted-path checks remain enforced.\n\n## Fix Commit(s)\n- `bafdbb6f112409a65decd3d4e7350fbd637c7754`\n\nThanks @nedlir for reporting.",
8+
"details": "An information disclosure vulnerability in OpenClaw's `tools.exec.safeBins` approval flow allowed a file-existence oracle.\n\nWhen safe-bin validation examined candidate file paths, command allow/deny behavior could differ based on whether a path already existed on the host filesystem. An attacker could probe for file presence by comparing outcomes for existing vs non-existing filenames.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Affected versions: `<= 2026.2.17`\n- Latest published vulnerable version at triage time: `2026.2.17`\n- Planned patched version: `2026.2.18`\n\n## Impact\nAttackers with access to this execution surface could infer whether specific files exist (for example secrets/config files), enabling filesystem enumeration and improving follow-on attack planning.\n\n## Fix\nThe safe-bin policy was changed to deterministic argv-only validation without host file-existence checks. File-oriented flags are blocked for safe-bin mode (for example `sort -o`, `jq -f`, `grep -f`), and trusted-path checks remain enforced.\n\n## Fix Commit(s)\n- `bafdbb6f112409a65decd3d4e7350fbd637c7754`\n\nFound using [MCPwner](https://github.com/Pigyon/MCPwner)\n\nThanks @nedlir for reporting.",
99
"severity": [
1010
{
1111
"type": "CVSS_V3",

advisories/github-reviewed/2026/02/GHSA-cg8j-5cr2-568q/GHSA-cg8j-5cr2-568q.json

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cg8j-5cr2-568q",
4-
"modified": "2026-02-25T15:50:58Z",
4+
"modified": "2026-02-27T21:57:20Z",
55
"published": "2026-02-21T06:30:16Z",
66
"aliases": [
77
"CVE-2026-26047"
@@ -101,7 +101,8 @@
101101
],
102102
"database_specific": {
103103
"cwe_ids": [
104-
"CWE-400"
104+
"CWE-400",
105+
"CWE-770"
105106
],
106107
"severity": "MODERATE",
107108
"github_reviewed": true,

0 commit comments

Comments
 (0)