Description
This affects all versions of package github.com/u-root/u-root/pkg/cpio. It is vulnerable to leading, non-leading relative path traversal attacks and symlink based (relative and absolute) path traversal attacks in cpio file extraction.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1250 | This affects all versions of package github.com/u-root/u-root/pkg/cpio. It is vulnerable to leading, non-leading relative path traversal attacks and symlink based (relative and absolute) path traversal attacks in cpio file extraction. |
Github GHSA |
GHSA-mq35-x99r-54fc | github.com/u-root/u-root/pkg/cpio Arbitrary File Write via Archive Extraction (Zip Slip) |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-16T20:41:57.886Z
Reserved: 2020-01-21T00:00:00.000Z
Link: CVE-2020-7666
No data.
Status : Modified
Published: 2020-09-01T14:15:14.253
Modified: 2024-11-21T05:37:34.327
Link: CVE-2020-7666
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA