First published: Sat Mar 29 2025(Updated: )
### Impact The library used to extract archives (github.com/jaredallard/archives) was vulnerable to the "zip slip" vulnerability. This is used to extract native extension archives and repository source archives. A native extension or repository archive could be crafted in such a way where a remote code execution or modification/reading of a file is possible using the user who is running stencil. The severity is marked as "medium" because native extensions have always considered to be "unsafe" to run when not trusted. Native extensions are arbitrary code being ran, which could always do this same exploit with less steps. The medium severity is to reflect that this could be done even when a user is _not_ using a native extension, for example a repository source archive. However, one would need to mutate the archives provided by Github or perform some hackery with links, which may not be possible. Thus, "medium" is used out of an abundance of caution where I would've labeled this as "low". ### Patches Patched in 2.3.0 and above. ### Workarounds No workarounds are present. ### References https://github.com/jaredallard/archives/security/advisories/GHSA-j95m-rcjp-q69h
Affected Software | Affected Version | How to fix |
---|---|---|
go/go.rgst.io/stencil/v2 | <2.3.0 | 2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-p799-q2pr-6mxj is classified as high due to the potential for remote code execution through crafted zip archives.
To fix GHSA-p799-q2pr-6mxj, upgrade to version 2.3.0 or later of the affected library.
The 'zip slip' vulnerability allows attackers to extract files outside of the intended target directory, leading to potential unauthorized file access and execution.
GHSA-p799-q2pr-6mxj affects the go.rgst.io/stencil/v2 package versions prior to 2.3.0.
If you are using an affected version, it is crucial to update to the fixed version as soon as possible to mitigate the risk.