A flaw was discovered in the mholt/archiver package. This flaw allows an attacker to create a specially crafted tar file, which, when unpacked, may allow access to restricted files or directories. This issue can allow the creation or overwriting of files with the user's or application's privileges using the library.
Vulnerable Library - github.com/mholt/archiver/v3-v3.5.1
Easily create & extract archives, and compress & decompress files of various formats
Library home page: https://proxy.golang.org/github.com/mholt/archiver/v3/@v/v3.5.1.zip
Path to dependency file: /go.mod
Path to vulnerable library: /go.mod
Found in HEAD commit: fd9fc1baf3cd86beecdfe1d4b962b3e768b4ff92
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-0406
### Vulnerable Library - github.com/mholt/archiver/v3-v3.5.1Easily create & extract archives, and compress & decompress files of various formats
Library home page: https://proxy.golang.org/github.com/mholt/archiver/v3/@v/v3.5.1.zip
Path to dependency file: /go.mod
Path to vulnerable library: /go.mod
Dependency Hierarchy: - :x: **github.com/mholt/archiver/v3-v3.5.1** (Vulnerable Library)
Found in HEAD commit: fd9fc1baf3cd86beecdfe1d4b962b3e768b4ff92
Found in base branch: master
### Vulnerability DetailsA flaw was discovered in the mholt/archiver package. This flaw allows an attacker to create a specially crafted tar file, which, when unpacked, may allow access to restricted files or directories. This issue can allow the creation or overwriting of files with the user's or application's privileges using the library.
Publish Date: 2024-04-06
URL: CVE-2024-0406
### CVSS 3 Score Details (6.1)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: High - Availability Impact: None
For more information on CVSS3 Scores, click here.