| - module: github.com/hashicorp/go-slug |
| - package: github.com/hashicorp/go-slug |
| summary: Directory traversal in github.com/hashicorp/go-slug |
| Protections against directory traversal during archive extraction can be |
| bypassed by chaining multiple symbolic links within the archive. This allows a |
| malicious attacker to cause files to be created outside of the target directory. |
| Additionally if the attacker is able to read extracted files they may create |
| symbolic links to arbitrary files on the system which the unpacker has |
| published: 2021-04-14T20:04:52Z |
| - fix: https://github.com/hashicorp/go-slug/pull/12 |
| - fix: https://github.com/hashicorp/go-slug/commit/28cafc59c8da6126a3ae94dfa84181df4073454f |
| - web: https://securitylab.github.com/advisories/GHSL-2020-262-zipslip-go-slug |