First published: Thu Dec 03 2020(Updated: )
HashiCorp go-slug up to 0.4.3 did not fully protect against directory traversal while unpacking tar archives, and protections could be bypassed with specific constructions of multiple symlinks. Fixed in 0.5.0.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/go-slug | <0.5.0 | 0.5.0 |
HashiCorp go-slug | <0.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29529 is a vulnerability in HashiCorp go-slug up to version 0.4.3 that allows directory traversal while unpacking tar archives, which can be bypassed with specific constructions of multiple symlinks.
CVE-2020-29529 has a severity rating of 7, which is considered high.
CVE-2020-29529 can be fixed by updating HashiCorp go-slug to version 0.5.0 or higher.
You can find more information about CVE-2020-29529 on the following references: [Reference 1](https://github.com/hashicorp/go-slug/compare/v0.4.3...v0.5.0), [Reference 2](https://github.com/hashicorp/go-slug/pull/12), [Reference 3](https://github.com/hashicorp/go-slug/releases/tag/v0.5.0)
The Common Weakness Enumerations (CWE) associated with CVE-2020-29529 are CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')) and CWE-59 (Improper Link Resolution Before File Access ('Link Following')).