Improper limitation of a pathname to a restricted directory ('path traversal') in Azure allows an unauthorized attacker to elevate privileges over a network.
What actions does a valid user have to take to be protected against this vulnerability? Update the image to the latest tag. User data and setting will not be affected by upgrading to the latest tag. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by bypassing authentication/authorization to access files located one directory above the intended file upload path. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could potentially download the content of parent folder of the mounted path.
<a href="https://twitter.com/yanir_">Yanir Tsarimi</a>