logo

CVE-2024-47877 github.com/codeclysm/extract/v3

Package

Manager: go
Name: github.com/codeclysm/extract/v3
Vulnerable Version: >=0 <=3.1.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00102 pctl0.28695

Details

Extract has insufficient checks allowing attacker to create symlinks outside the extraction directory. ### Impact A maliciously crafted archive may allow an attacker to create a symlink outside the extraction target directory. ### Patches Please use version 4.0.0 or later `github.com/codeclysm/extract/v4`. Any previous version is affected by the bug. ### Workarounds No knows workarounds. ### Backward compatibility notes about upgrading to `/v4` from `/v3` If you're not using the `extract.Extractor.FS` interface, you will not face any breaking changes and upgrading should be as simple as changing the import to `/v4`. This should be the case for most of the userbase. If you're using the `Extractor.FS` interface, then upgrading to `/v4` will require to implement the new methods that have been added: ```go type FS interface { Link(string, string) error MkdirAll(string, os.FileMode) error OpenFile(name string, flag int, perm os.FileMode) (*os.File, error) Symlink(string, string) error // The following methods have been added in the /v4 interface: Remove(path string) error Stat(name string) (os.FileInfo, error) Chmod(name string, mode os.FileMode) error } ``` There should be no other breaking changes in the `/v4` API.

Metadata

Created: 2024-10-11T18:10:24Z
Modified: 2024-10-15T19:53:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-8rm2-93mq-jqhc/GHSA-8rm2-93mq-jqhc.json
CWE IDs: ["CWE-22", "CWE-61"]
Alternative ID: GHSA-8rm2-93mq-jqhc
Finding: F063
Auto approve: 1