First published: Thu Sep 05 2024(Updated: )
### Impact A vulnerability exists in stripe-cli versions 1.11.1 and higher where a plugin package containing a manifest with a malformed plugin shortname installed using the --archive-url or --archive-path flags can overwrite arbitrary files. The update addresses the path traversal vulnerability by removing the ability to install plugins from an archive URL or path. There has been no evidence of exploitation of this vulnerability. ### Recommendation Upgrade to stripe-cli v1.21.3. ### Acknowledgements Thank you to [0xacb](https://hackerone.com/0xacb) and [bordiez](https://hackerone.com/bordiez) for reporting this vulnerability. ### For more information Email us at [security@stripe.com](mailto:security@stripe.com)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/stripe/stripe-cli | >=1.11.1<1.21.3 | 1.21.3 |
Stripe | >=1.11.1<1.21.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45401 is classified as a medium severity vulnerability.
To fix CVE-2024-45401, upgrade the stripe-cli to version 1.21.3 or later.
CVE-2024-45401 affects stripe-cli versions from 1.11.1 up to, but not including, 1.21.3.
CVE-2024-45401 involves a path traversal vulnerability that allows arbitrary file overwrites through malformed plugin shortnames.
Yes, CVE-2024-45401 can be exploited remotely by attackers using compromised plugin packages.