Skip to content

Path traversal vulnerability in stripe-cli

High severity GitHub Reviewed Published Sep 5, 2024 in stripe/stripe-cli • Updated Sep 9, 2024

Package

gomod github.com/stripe/stripe-cli (Go)

Affected versions

>= 1.11.1, < 1.21.3

Patched versions

1.21.3

Description

Impact

A vulnerability exists in stripe-cli versions 1.11.1 and higher where a plugin package containing a manifest with a malformed plugin shortname installed using the --archive-url or --archive-path flags can overwrite arbitrary files.

The update addresses the path traversal vulnerability by removing the ability to install plugins from an archive URL or path.

There has been no evidence of exploitation of this vulnerability.

Recommendation

Upgrade to stripe-cli v1.21.3.

Acknowledgements

Thank you to 0xacb and bordiez for reporting this vulnerability.

For more information

Email us at [email protected]

References

@tomas-stripe tomas-stripe published to stripe/stripe-cli Sep 5, 2024
Published to the GitHub Advisory Database Sep 5, 2024
Reviewed Sep 5, 2024
Published by the National Vulnerability Database Sep 5, 2024
Last updated Sep 9, 2024

Severity

High

EPSS score

0.044%
(12th percentile)

Weaknesses

CVE ID

CVE-2024-45401

GHSA ID

GHSA-fv4g-gwpj-74gr

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.