Описание
esm.sh is a no-build content delivery network (CDN) for web development. Prior to Go pseeudoversion 0.0.0-20260116051925-c62ab83c589e, the software has a path traversal vulnerability due to an incomplete fix. path.Clean normalizes a path but does not prevent absolute paths in a malicious tar file. Commit https://github.com/esm-dev/esm.sh/commit/9d77b88c320733ff6689d938d85d246a3af9af16, corresponding to pseudoversion 0.0.0-20260116051925-c62ab83c589e, fixes this issue.
Ссылки
- Patch
- Patch
- Vendor Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 136 (исключая)
cpe:2.3:a:esm:esm.sh:*:*:*:*:*:*:*:*
EPSS
Процентиль: 29%
0.00106
Низкий
7.5 High
CVSS3
Дефекты
CWE-22
Связанные уязвимости
github
2 месяца назад
esm.sh has a path traversal in extractPackageTarball enables file writes from malicious packages
EPSS
Процентиль: 29%
0.00106
Низкий
7.5 High
CVSS3
Дефекты
CWE-22