The R programming language’s default package manager CRAN is affected by a path traversal vulnerability that can lead to server compromise. This vulnerability affects packages installed via the R CMD install cli command or the install.packages() function from the interpreter. Update to version 4.0.3
References
Link | Resource |
---|---|
https://labs.bishopfox.com/advisories/cran-version-4.0.2 | Exploit Third Party Advisory |
https://security.gentoo.org/glsa/202401-07 | |
https://www.r-project.org/foundation/ | Vendor Advisory |
https://labs.bishopfox.com/advisories/cran-version-4.0.2 | Exploit Third Party Advisory |
https://security.gentoo.org/glsa/202401-07 | |
https://www.r-project.org/foundation/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 05:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://labs.bishopfox.com/advisories/cran-version-4.0.2 - Exploit, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202401-07 - | |
References | () https://www.r-project.org/foundation/ - Vendor Advisory |
06 Jan 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2021-01-12 04:15
Updated : 2024-11-21 05:21
NVD link : CVE-2020-27637
Mitre link : CVE-2020-27637
CVE.ORG link : CVE-2020-27637
JSON object : View
Products Affected
r-project
- cran
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')