First published: Wed Jun 24 2020(Updated: )
In package github.com/sassoftware/go-rpmutils/cpio before version 0.1.0, the CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading ".." which leads in file extraction outside of the current directory. Note: the fixing commit was applied to all affected versions which were re-released.
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/sassoftware/go-rpmutils | <0.1.0 | 0.1.0 |
Sas Go Rpm Utils | <0.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7667 is a vulnerability in the CPIO extraction functionality of the go-rpmutils/cpio package before version 0.1.0.
The severity of CVE-2020-7667 is high, with a CVSS score of 7.5.
CVE-2020-7667 affects the go-rpmutils/cpio package before version 0.1.0.
The remedy for CVE-2020-7667 is to update the go-rpmutils/cpio package to version 0.1.0 or higher.
More information about CVE-2020-7667 can be found at the following references: [1] NIST NVD: https://nvd.nist.gov/vuln/detail/CVE-2020-7667 [2] GitHub Commit: https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0 [3] Snyk: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427