Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-0377

Опубликовано: 21 янв. 2025
Источник: redhat
CVSS3: 7.5

Описание

HashiCorp’s go-slug library is vulnerable to a zip-slip style attack when a non-existing user-provided path is extracted from the tar entry.

An archive extraction vulnerability was found in HashiCorp's go-slug library. When go-slug performs an extraction, the filename/extraction path is taken from the tar entry via the header.Name. It was discovered that the unpacking step improperly validated paths, potentially leading to path traversal and allowing an attacker to write an arbitrary file during extraction.

Отчет

None of the Red Hat offerings are affected by this vulnerability. This issue has an impact over the integrity of the system as can write and over-write arbitrary files on the system where these files are extracted.

Меры по смягчению последствий

No mitigation is available for this issue other than updating the affected package to the version containing the fix.

Дополнительная информация

Статус:

Important
Дефект:
CWE-59
https://bugzilla.redhat.com/show_bug.cgi?id=2339156go-slug: HashiCorp go-slug Vulnerable to Zip Slip Attack

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
11 месяцев назад

HashiCorp’s go-slug library is vulnerable to a zip-slip style attack when a non-existing user-provided path is extracted from the tar entry.

CVSS3: 7.5
github
11 месяцев назад

HashiCorp go-slug Vulnerable to Zip Slip Attack

suse-cvrf
около 1 месяца назад

Security update for helmfile

suse-cvrf
11 месяцев назад

Security update for govulncheck-vulndb

7.5 High

CVSS3