Impact
A security vulnerability has been identified in the DFIR-IRIS datastore file management system where mass assignment of the
file_local_name field combined with path trust in the delete operation enables authenticated users to delete arbitrary filesystem
paths. This vulnerability builds upon the previously identified mass assignment weakness in the same schema, demonstrating how
field-level access control failures can cascade into destructive operations.
The vulnerability manifests through a three-step attack chain: authenticated users upload a file to the datastore, update the file's
file_local_name field to point to an arbitrary filesystem path through mass assignment, then trigger the delete operation which
removes the target file without path validation.
Both the system compromise and operational disruption become possible because the delete operation trusts database-stored
paths without re-validation, assuming they are system-generated UUID-based paths. Mass assignment bypasses this assumption
entirely.
Patches
Issued in 2.4.24
Workarounds
None
Impact
A security vulnerability has been identified in the DFIR-IRIS datastore file management system where mass assignment of the
file_local_name field combined with path trust in the delete operation enables authenticated users to delete arbitrary filesystem
paths. This vulnerability builds upon the previously identified mass assignment weakness in the same schema, demonstrating how
field-level access control failures can cascade into destructive operations.
The vulnerability manifests through a three-step attack chain: authenticated users upload a file to the datastore, update the file's
file_local_name field to point to an arbitrary filesystem path through mass assignment, then trigger the delete operation which
removes the target file without path validation.
Both the system compromise and operational disruption become possible because the delete operation trusts database-stored
paths without re-validation, assuming they are system-generated UUID-based paths. Mass assignment bypasses this assumption
entirely.
Patches
Issued in 2.4.24
Workarounds
None