This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Path Traversal in **Incus** (LXC manager). Attackers use crafted config keys to write outside the `credentials` directory. π₯ **Consequences**: Privilege Escalation & Denial of Service (DoS).β¦
π‘οΈ **CWE-22**: Improper Limitation of a Pathname to a Restricted Directory. The flaw lies in insufficient validation of configuration keys, allowing directory traversal sequences to escape the intended sandbox.
Q3Who is affected? (Versions/Components)
π¦ **Vendor**: LXC. **Product**: Incus. **Affected**: Versions **prior to 6.23.0**. If you are running 6.22.x or earlier, you are at risk! π Published: 2026-03-26.
Q4What can hackers do? (Privileges/Data)
π **Impact**: High! CVSS Vector indicates **Complete** impact on Confidentiality, Integrity, and Availability. Hackers can potentially escalate privileges to root and disrupt services via DoS.
Q5Is exploitation threshold high? (Auth/Config)
π **Threshold**: Medium. Requires **Low Privileges** (PR:L) and **Low Complexity** (AC:L). No user interaction needed (UI:N). Network accessible (AV:N). You need some access to set config keys.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π΅οΈ **Exploit Status**: No public PoC listed in the data (`pocs: []`). However, the advisory is confirmed via GitHub GHSA. Wild exploitation is likely imminent given the low barrier to entry.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for Incus versions < 6.23.0. Check if configuration keys allow directory traversal characters (`../`). Monitor for unauthorized file writes outside the `credentials` directory.
Q8Is it fixed officially? (Patch/Mitigation)
β **Fix**: Yes! Upgrade to **Incus 6.23.0** or later. Official advisory available at: `https://github.com/lxc/incus/security/advisories/GHSA-q4q8-7f2j-9h9f`.
Q9What if no patch? (Workaround)
π§ **Workaround**: If patching is delayed, restrict network access to the Incus API. Strictly validate and sanitize all configuration inputs. Limit user privileges to prevent config modification.
Q10Is it urgent? (Priority Suggestion)
π₯ **Priority**: **CRITICAL**. High CVSS score + Network Access + Low Auth Requirement = Urgent patching required. Do not ignore this! πββοΈπ¨