| 12 | |
| 13 | [source:1.8.3/docs/known_issues.rst#unauthorized-deletion-of-an-immutable-file-by-its-storage-index known_issues.rst for 1.8.3] has more details, but I'll paste the most relevant bit here: |
| 14 | |
| 15 | This vulnerability does not enable anyone to read file contents without authorization (confidentiality), nor to change the contents of a file (integrity). |
| 16 | |
| 17 | A person could learn the storage index of a file in several ways: |
| 18 | |
| 19 | 1. By being granted the authority to read the immutable file—i.e. by being granted a read capability to the file. They can determine the file's storage index from its read capability. |
| 20 | |
| 21 | 2. By being granted a verify capability to the file. They can determine the file's storage index from its verify capability. This case probably doesn't happen often because users typically don't share verify caps. |
| 22 | |
| 23 | 3. By operating a storage server, and receiving a request from a client that has a read cap or a verify cap. If the client attempts to upload, download, or verify the file with their storage server, even if it doesn't actually have the file, then they can learn the storage index of the file. |
| 24 | |
| 25 | 4. By gaining read access to an existing storage server's local filesystem, and inspecting the directory structure that it stores its shares in. They can thus learn the storage indexes of all files that the server is holding at least one share of. Normally only the operator of an existing storage server would be able to inspect its local filesystem, so this requires either being such an operator of an existing storage server, or somehow gaining the ability to inspect the local filesystem of an existing storage server. |