CVE-2026-29190

4.1 MEDIUM

📋 TL;DR

CVE-2026-29190 is a path traversal vulnerability in Karapace's backup reader that allows arbitrary file read when processing malicious backup files. This affects deployments using backup/restore functionality with untrusted backup sources. The impact depends on the Karapace process's file system permissions.

💻 Affected Systems

Products:
  • Karapace
Versions: All versions prior to 6.0.0
Operating Systems: All operating systems running Karapace
Default Config Vulnerable: ✅ No
Notes: Only affects deployments using backup/restore functionality and processing backups from untrusted sources.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could read sensitive system files (e.g., /etc/passwd, SSH keys, configuration files) leading to credential theft, privilege escalation, or further system compromise.

🟠

Likely Case

Limited file read based on Karapace process permissions, potentially exposing application configuration, logs, or other accessible files.

🟢

If Mitigated

No impact if backups are only processed from trusted sources or the vulnerability is patched.

🌐 Internet-Facing: MEDIUM - Requires backup functionality exposure and untrusted backup processing, which may not be common in internet-facing deployments.
🏢 Internal Only: MEDIUM - Internal attackers with backup upload capabilities could exploit this to read sensitive files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to provide malicious backup files to Karapace's backup reader.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.0

Vendor Advisory: https://github.com/Aiven-Open/karapace/security/advisories/GHSA-rw4j-p3jg-4fxq

Restart Required: Yes

Instructions:

1. Upgrade Karapace to version 6.0.0 or later. 2. Restart the Karapace service. 3. Verify the upgrade was successful.

🔧 Temporary Workarounds

Disable backup processing

all

Temporarily disable backup/restore functionality if not required

# Configure Karapace to disable backup endpoints or restrict access

Restrict backup sources

all

Only process backups from trusted, verified sources

# Implement source validation for backup files

🧯 If You Can't Patch

  • Implement strict access controls on backup upload functionality
  • Run Karapace with minimal file system permissions (least privilege principle)

🔍 How to Verify

Check if Vulnerable:

Check Karapace version and if backup functionality is enabled with untrusted source processing

Check Version:

karapace --version or check package manager (e.g., dpkg -l | grep karapace)

Verify Fix Applied:

Confirm Karapace version is 6.0.0 or later and test backup processing with path traversal attempts

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in Karapace logs
  • Failed path traversal attempts in backup processing logs

Network Indicators:

  • Suspicious backup file uploads to Karapace endpoints

SIEM Query:

source="karapace" AND ("backup" OR "path traversal" OR "file read")

🔗 References

📤 Share & Export