Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4cx6-fj7j-pjx9

Опубликовано: 10 мар. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.7

Описание

Code injection in Stripe CLI on windows

Impact

A vulnerability in Stripe CLI exists on Windows when certain commands are run in a directory where an attacker has planted files. The commands are stripe login, stripe config -e, stripe community, and stripe open. MacOS and Linux are unaffected.

An attacker who successfully exploits the vulnerability can run arbitrary code in the context of the current user. The update addresses the vulnerability by throwing an error in these situations before the code can run.

There has been no evidence of exploitation of this vulnerability.

Recommendation

Upgrade to Stripe CLI v1.7.13.

Acknowledgments

Thanks to trungpabc for reporting the issue.

For more information

Email us at security@stripe.com.

Пакеты

Наименование

github.com/stripe/stripe-cli

go
Затронутые версииВерсия исправления

< 1.7.13

1.7.13

EPSS

Процентиль: 34%
0.00136
Низкий

7.7 High

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 7.7
nvd
почти 4 года назад

Stripe CLI is a command-line tool for the Stripe eCommerce platform. A vulnerability in Stripe CLI exists on Windows when certain commands are run in a directory where an attacker has planted files. The commands are `stripe login`, `stripe config -e`, `stripe community`, and `stripe open`. MacOS and Linux are unaffected. An attacker who successfully exploits the vulnerability can run arbitrary code in the context of the current user. The update addresses the vulnerability by throwing an error in these situations before the code can run.Users are advised to upgrade to version 1.7.13. There are no known workarounds for this issue.

EPSS

Процентиль: 34%
0.00136
Низкий

7.7 High

CVSS3

Дефекты

CWE-78