Extract is aA Go library to extract archives in zip, tar.gz or tar.bz2 formats. A maliciously crafted archive may allow an attacker to create a symlink outside the extraction target directory. This vulnerability is fixed in 4.0.0. If you're using the Extractor.FS interface, then upgrading to /v4 will require to implement the new methods that have been added.
References
Configurations
History
22 Nov 2024, 19:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/codeclysm/extract/commit/4a98568021b8e289345c7f526ccbd7ed732cf286 - Patch | |
References | () https://github.com/codeclysm/extract/security/advisories/GHSA-8rm2-93mq-jqhc - Vendor Advisory | |
CPE | cpe:2.3:a:codeclysm:extract:*:*:*:*:*:go:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
First Time |
Codeclysm extract
Codeclysm |
15 Oct 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Oct 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-11 17:15
Updated : 2024-11-22 19:30
NVD link : CVE-2024-47877
Mitre link : CVE-2024-47877
CVE.ORG link : CVE-2024-47877
JSON object : View
Products Affected
codeclysm
- extract