CWE
22
Advisory Published
Updated

GHSA-p799-q2pr-6mxj: Path Traversal

First published: Sat Mar 29 2025(Updated: )

### Impact The library used to extract archives (github.com/jaredallard/archives) was vulnerable to the "zip slip" vulnerability. This is used to extract native extension archives and repository source archives. A native extension or repository archive could be crafted in such a way where a remote code execution or modification/reading of a file is possible using the user who is running stencil. The severity is marked as "medium" because native extensions have always considered to be "unsafe" to run when not trusted. Native extensions are arbitrary code being ran, which could always do this same exploit with less steps. The medium severity is to reflect that this could be done even when a user is _not_ using a native extension, for example a repository source archive. However, one would need to mutate the archives provided by Github or perform some hackery with links, which may not be possible. Thus, "medium" is used out of an abundance of caution where I would've labeled this as "low". ### Patches Patched in 2.3.0 and above. ### Workarounds No workarounds are present. ### References https://github.com/jaredallard/archives/security/advisories/GHSA-j95m-rcjp-q69h

Affected SoftwareAffected VersionHow to fix
go/go.rgst.io/stencil/v2<2.3.0
2.3.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of GHSA-p799-q2pr-6mxj?

    The severity of GHSA-p799-q2pr-6mxj is classified as high due to the potential for remote code execution through crafted zip archives.

  • How do I fix GHSA-p799-q2pr-6mxj?

    To fix GHSA-p799-q2pr-6mxj, upgrade to version 2.3.0 or later of the affected library.

  • What is the 'zip slip' vulnerability in GHSA-p799-q2pr-6mxj?

    The 'zip slip' vulnerability allows attackers to extract files outside of the intended target directory, leading to potential unauthorized file access and execution.

  • Which software is affected by GHSA-p799-q2pr-6mxj?

    GHSA-p799-q2pr-6mxj affects the go.rgst.io/stencil/v2 package versions prior to 2.3.0.

  • What actions should I take if I am using an affected version related to GHSA-p799-q2pr-6mxj?

    If you are using an affected version, it is crucial to update to the fixed version as soon as possible to mitigate the risk.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203