Описание
HashiCorp’s go-slug library is vulnerable to a zip-slip style attack when a non-existing user-provided path is extracted from the tar entry.
An archive extraction vulnerability was found in HashiCorp's go-slug library. When go-slug performs an extraction, the filename/extraction path is taken from the tar entry via the header.Name. It was discovered that the unpacking step improperly validated paths, potentially leading to path traversal and allowing an attacker to write an arbitrary file during extraction.
Отчет
None of the Red Hat offerings are affected by this vulnerability. This issue has an impact over the integrity of the system as can write and over-write arbitrary files on the system where these files are extracted.
Меры по смягчению последствий
No mitigation is available for this issue other than updating the affected package to the version containing the fix.
Дополнительная информация
Статус:
7.5 High
CVSS3
Связанные уязвимости
HashiCorp’s go-slug library is vulnerable to a zip-slip style attack when a non-existing user-provided path is extracted from the tar entry.
7.5 High
CVSS3