x/vulndb: potential Go vuln in github.com/mholt/archiver: CVE-2025-3445 · Issue #3605 · golang/vulndb · GitHub
More Web Proxy on the site http://driver.im/
You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
A Path Traversal "Zip Slip" vulnerability has been identified in mholt/archiver in Go. This vulnerability allows using a crafted ZIP file containing path traversal symlinks to create or overwrite files with the user's privileges or application utilizing the library.
When using the archiver.Unarchive functionality with ZIP files, like this: archiver.Unarchive(zipFile, outputDir), A crafted ZIP file can be extracted in such
8000
a way that it writes files to the affected system with the same privileges as the application executing this vulnerable functionality. Consequently, sensitive files may be...
This report triggered an edge-case testing failure; in short, all reports are tested (all_test.go) against themselves and their future reports.
This impacts how a highPriority designation may be made.
For this particular report, it just so happens that less previous reports were in a REVIEWED state than not. Upon inclusion of this new (correctly classified) highPriority report, the REVIEWED counter increases. This will cause any previous reports for github.com/mholt/... that are notREVIEWED to trip a "this report should be reviewed" invariant.
To fix this, all_test.go should evaluate each report at point-in-time basis (i.e. only consider reports up to itself when testing the invariant mentioned above) when checking for correctness.
Advisory CVE-2025-3445 references a vulnerability in the following Go modules:
Description:
A Path Traversal "Zip Slip" vulnerability has been identified in mholt/archiver in Go. This vulnerability allows using a crafted ZIP file containing path traversal symlinks to create or overwrite files with the user's privileges or application utilizing the library.
When using the archiver.Unarchive functionality with ZIP files, like this: archiver.Unarchive(zipFile, outputDir), A crafted ZIP file can be extracted in such 8000 a way that it writes files to the affected system with the same privileges as the application executing this vulnerable functionality. Consequently, sensitive files may be...
References:
Cross references:
See doc/quickstart.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: