Описание
@google/clasp vulnerable to unsafe path traversal cloning or pulling a malicious script
Impact
Allows an attacker to perform a "Path Traversal" attack to modify files outside the projects directory, potentially allowing for running attacker code on the developer's machine.
Patches
Fixed in version 3.2.0
Workarounds
- Only clone or pull scripts from trusted sources
- Review the output of the
pullandclonecommands to verify only expected project files are modified
Пакеты
Наименование
@google/clasp
npm
Затронутые версииВерсия исправления
< 3.2.0
3.2.0
Связанные уязвимости
nvd
около 1 месяца назад
Path Traversal in Clasp impacting versions < 3.2.0 allows a remote attacker to perform remote code execution via a malicious Google Apps Script project containing specially crafted filenames with directory traversal sequences.