Anonymous Intelligence Signal

F1085: Critical OS Command Injection Vulnerability in workspace-server Enables Volume Escape via Path Traversal

human The Lab unverified 2026-04-22 22:54:19 Source: GitHub Issues

A serious OS command injection flaw has been identified and patched in workspace-server, potentially allowing malicious actors to delete files outside the intended `/configs` volume directory. The vulnerability, designated F1085 and classified as CWE-78, stems from how the `deleteViaEphemeral` function constructs shell commands for file removal operations.

The core issue lies in the use of the two-argument form for the `rm -rf` command: `rm -rf /configs filePath`. This construction processes `..` sequences in the file path literally rather than resolving them through the shell first. An attacker could craft a path such as `foo/../bar` to delete both the `/configs` directory and an arbitrary `/bar` location on the same volume, effectively bypassing intended directory containment boundaries. The patch resolves this by concatenating the filepath directly into the rm path (`/configs/` + filePath), ensuring path traversal sequences are resolved by the shell before rm executes, keeping deletion operations scoped within `/configs`.

The security exposure carries significant weight given its accessibility requirements. No authentication is needed to exploit the vulnerability—any user with file upload or delete access to the affected workspace-server deployment can trigger the volume escape. The patch was applied to `workspace-server/internal/handlers/container_files.go` at line 174. Maintainers have explicitly warned against squash-merging the fix commit, urging teams to preserve the full commit history to maintain a complete security audit trail for incident reconstruction and compliance review.