Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-923j-vrcg-hxwh

Опубликовано: 29 янв. 2026
Источник: github
Github: Прошло ревью
CVSS3: 5.5

Описание

malcontent vulnerable to symlink Path Traversal via handleSymlink argument confusion in archive extraction

malcontent could be made to create symlinks outside the intended extraction directory when scanning a specially crafted tar or deb archive. The handleSymlink function received arguments in the wrong order, causing the symlink target to be used as the symlink location. Additionally, symlink targets were not validated to ensure they resolved within the extraction directory.

Fixes:

Acknowledgements

Thank you to Oleh Konko from 1seal for discovering and reporting this issue.

Пакеты

Наименование

github.com/chainguard-dev/malcontent

go
Затронутые версииВерсия исправления

>= 1.8.0, < 1.20.3

1.20.3

EPSS

Процентиль: 0%
0.00005
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-22
CWE-683

Связанные уязвимости

CVSS3: 5.5
nvd
8 дней назад

malcontent discovers supply-chain compromises through. context, differential analysis, and YARA. Starting in version 1.8.0 and prior to version 1.20.3, malcontent could be made to create symlinks outside the intended extraction directory when scanning a specially crafted tar or deb archive. The `handleSymlink` function received arguments in the wrong order, causing the symlink target to be used as the symlink location. Additionally, symlink targets were not validated to ensure they resolved within the extraction directory. Version 1.20.3 introduces fixes that swap handleSymlink arguments, validate symlink location, and validate symlink targets that resolve within an extraction directory.

EPSS

Процентиль: 0%
0.00005
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-22
CWE-683