CVE-2020-29529
Summary
| CVE | CVE-2020-29529 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-12-03 20:15:00 UTC |
| Updated | 2021-03-08 13:22:00 UTC |
| Description | HashiCorp go-slug up to 0.4.3 did not fully protect against directory traversal while unpacking tar archives, and protections could be bypassed with specific constructions of multiple symlinks. Fixed in 0.5.0. |
Risk And Classification
Problem Types: CWE-22 | CWE-59
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Fix for unsafe tar unpacking by eastebry · Pull Request #12 · hashicorp/go-slug · GitHub | MISC | github.com | Patch, Third Party Advisory |
| GHSL-2020-262: Unsafe handling of symbolic links in go-slug unpacking routine - CVE-2020-29529 - GitHub Security Lab | MISC | securitylab.github.com | Exploit, Third Party Advisory |
| Release v0.5.0 · hashicorp/go-slug · GitHub | MISC | github.com | Release Notes, Third Party Advisory |
| Comparing v0.4.3...v0.5.0 · hashicorp/go-slug · GitHub | MISC | github.com | Patch, Release Notes, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 180786 Debian Security Update for golang-github-hashicorp-go-slug (CVE-2020-29529)