Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rmjr-87wv-gf87

Опубликовано: 17 окт. 2025
Источник: github
Github: Прошло ревью
CVSS4: 5.4
CVSS3: 9.3

Описание

Mammoth is vulnerable to Directory Traversal

Versions of the package mammoth from 0.3.25 and before 1.11.0; versions of the package mammoth from 0.3.25 and before 1.11.0; versions of the package mammoth before 1.11.0; versions of the package org.zwobble.mammoth:mammoth before 1.11.0 are vulnerable to Directory Traversal due to the lack of path or file type validation when processing a docx file containing an image with an external link (r:link attribute instead of embedded r:embed). The library resolves the URI to a file path and after reading, the content is encoded as base64 and included in the HTML output as a data URI. An attacker can read arbitrary files on the system where the conversion is performed or cause an excessive resources consumption by crafting a docx file that links to special device files such as /dev/random or /dev/zero.

Пакеты

Наименование

mammoth

npm
Затронутые версииВерсия исправления

>= 0.3.25, < 1.11.0

1.11.0

Наименование

org.zwobble.mammoth:mammoth

maven
Затронутые версииВерсия исправления

< 1.11.0

1.11.0

Наименование

mammoth

pip
Затронутые версииВерсия исправления

>= 0.3.25, < 1.11.0

1.11.0

Наименование

Mammoth

nuget
Затронутые версииВерсия исправления

< 1.11.0

1.11.0

EPSS

Процентиль: 55%
0.0033
Низкий

5.4 Medium

CVSS4

9.3 Critical

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 9.3
nvd
4 месяца назад

Versions of the package mammoth from 0.3.25 and before 1.11.0; versions of the package mammoth from 0.3.25 and before 1.11.0; versions of the package mammoth before 1.11.0; versions of the package org.zwobble.mammoth:mammoth before 1.11.0 are vulnerable to Directory Traversal due to the lack of path or file type validation when processing a docx file containing an image with an external link (r:link attribute instead of embedded r:embed). The library resolves the URI to a file path and after reading, the content is encoded as base64 and included in the HTML output as a data URI. An attacker can read arbitrary files on the system where the conversion is performed or cause an excessive resources consumption by crafting a docx file that links to special device files such as /dev/random or /dev/zero.

EPSS

Процентиль: 55%
0.0033
Низкий

5.4 Medium

CVSS4

9.3 Critical

CVSS3

Дефекты

CWE-22