In package github.com/sassoftware/go-rpmutils/cpio before version 0.1.0, the CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading ".." which leads in file extraction outside of the current directory. Note: the fixing commit was applied to all affected versions which were re-released.
References
Link | Resource |
---|---|
https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427 | Exploit Third Party Advisory |
https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0 - Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427 - Exploit, Third Party Advisory |
Information
Published : 2020-06-24 12:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7667
Mitre link : CVE-2020-7667
CVE.ORG link : CVE-2020-7667
JSON object : View
Products Affected
sas
- go_rpm_utils
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')