Skip to content

Commit 13f2e30

Browse files
1 parent 1895618 commit 13f2e30

4 files changed

Lines changed: 178 additions & 9 deletions

File tree

advisories/unreviewed/2026/01/GHSA-3966-f6p6-2qr9/GHSA-3966-f6p6-2qr9.json renamed to advisories/github-reviewed/2026/01/GHSA-3966-f6p6-2qr9/GHSA-3966-f6p6-2qr9.json

Lines changed: 16 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3966-f6p6-2qr9",
4-
"modified": "2026-01-23T06:31:32Z",
4+
"modified": "2026-02-03T17:42:06Z",
55
"published": "2026-01-23T06:31:24Z",
66
"aliases": [
77
"CVE-2026-0775"
88
],
9-
"summary": "CVE-2026-0775",
10-
"details": "npm cli Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of npm cli. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the handling of modules. The application loads modules from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of a target user. Was ZDI-CAN-25430.",
9+
"summary": "npm cli Uncontrolled Search Path Element Local Privilege Escalation Vulnerability",
10+
"details": "npm cli Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of npm cli. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the handling of modules. The application loads modules from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of a target user.",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
@@ -26,6 +26,9 @@
2626
"events": [
2727
{
2828
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "11.8.0"
2932
}
3033
]
3134
}
@@ -37,6 +40,14 @@
3740
"type": "ADVISORY",
3841
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0775"
3942
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/npm/cli/issues/8939"
46+
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/npm/cli"
50+
},
4051
{
4152
"type": "WEB",
4253
"url": "https://www.zerodayinitiative.com/advisories/ZDI-26-043"
@@ -47,8 +58,8 @@
4758
"CWE-732"
4859
],
4960
"severity": "HIGH",
50-
"github_reviewed": false,
51-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2026-02-03T17:42:06Z",
5263
"nvd_published_at": "2026-01-23T04:16:04Z"
5364
}
5465
}

advisories/github-reviewed/2026/01/GHSA-p5wg-g6qr-c7cg/GHSA-p5wg-g6qr-c7cg.json

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,14 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-p5wg-g6qr-c7cg",
4-
"modified": "2026-01-29T14:58:19Z",
4+
"modified": "2026-02-03T17:43:56Z",
55
"published": "2026-01-26T18:31:29Z",
6+
"withdrawn": "2026-02-03T17:43:56Z",
67
"aliases": [
78
"CVE-2025-50537"
89
],
9-
"summary": "Not a vulnerability",
10-
"details": "There is a Stack Overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in `eslint/lib/shared/serialization.js`. The exploit is triggered via the `RuleTester.run()` method, which validates test cases and checks for duplicates. During validation, the internal function `checkDuplicateTestCase()` is called, which in turn uses the `isSerializable()` function for serialization checks. When a circular reference object is passed in, `isSerializable()` enters infinite recursion, ultimately causing a Stack Overflow.",
10+
"summary": "Withdrawn Advisory: eslint has a Stack Overflow when serializing objects with circular references",
11+
"details": "## Withdrawn Advisory\nThis advisory has been withdrawn because RuleTester is used for testing rules during development and results in a error rather than crashing the application.\n\n## Original Description\n\nThere is a Stack Overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in `eslint/lib/shared/serialization.js`. The exploit is triggered via the `RuleTester.run()` method, which validates test cases and checks for duplicates. During validation, the internal function `checkDuplicateTestCase()` is called, which in turn uses the `isSerializable()` function for serialization checks. When a circular reference object is passed in, `isSerializable()` enters infinite recursion, ultimately causing a Stack Overflow.",
1112
"severity": [
1213
{
1314
"type": "CVSS_V3",
@@ -58,7 +59,9 @@
5859
}
5960
],
6061
"database_specific": {
61-
"cwe_ids": [],
62+
"cwe_ids": [
63+
"CWE-674"
64+
],
6265
"severity": "MODERATE",
6366
"github_reviewed": true,
6467
"github_reviewed_at": "2026-01-29T14:58:17Z",
Lines changed: 90 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,90 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-cc8f-xg8v-72m3",
4+
"modified": "2026-02-03T17:42:19Z",
5+
"published": "2026-02-03T17:42:18Z",
6+
"aliases": [
7+
"CVE-2026-24884"
8+
],
9+
"summary": "Compressing Vulnerable to Arbitrary File Write via Symlink Extraction",
10+
"details": "# Arbitrary File Write via Symlink Extraction in `github.com/node-modules/compressing`\n\n## Brief Introduction\n\nThe `compressing` npm package extracts TAR archives while restoring symbolic links without validating their targets. \nBy embedding symlinks that resolve outside the intended extraction directory, an attacker can cause subsequent file entries to be written to arbitrary locations on the host file system.\n\nDepending on the extractor’s handling of existing files, this behavior may allow overwriting sensitive files or creating new files in security-critical locations.\n\n## Affected Component and Versions\n\n- **Component**: `github.com/node-modules/compressing`\n- **Affected Versions**: `<= 1.10.3 || =2.0.0` \n\n## Vulnerability Details\n\n### Root Cause\n\n`compressing.tar.uncompress` sanitizes the destination paths of archive entries, but it does **not** restrict or validate the targets of symlinks contained in TAR archives. During extraction, the library creates those symlinks inside the output directory. Later entries that resolve through the symlink are written to the symlink target rather than the intended extraction root, enabling an arbitrary file write.\n\n### Impact\n\nAn attacker who can supply a crafted TAR archive can:\n\n- Cause files to be written outside the intended extraction directory (arbitrary file write via symlink traversal).\n\n- Write files to attacker-controlled paths on the host file system once symbolic links are followed during extraction.\n\n- In environments where extraction is performed with elevated privileges or targets executable paths, this may lead to code execution, privilege escalation, data corruption, or denial of service.\n\n## Reproduction\n\n### Environment\n\n- **OS**: Ubuntu 24.04\n- **Node.js**: v24.12.0\n- **compressing**: 2.0.0\n\n### Construct PoC Archive\n\nThe following pseudo-code demonstrates the attack logic:\n\n```python\nbase_dir = \"archive/\"\nwith tarfile.open(\"./poc_arbitrary_write.tar\", mode=\"w\") as tar:\n add_regular_file(tar, base_dir + \"baseFile.txt\", \"base content\\n\")\n add_symlink(tar, base_dir + \"myTmp\", \"/tmp\")\n add_regular_file(tar, base_dir + \"myTmp/poc.txt\", \"Arbitrary File Write\\n\")\n```\n\n### Extract the Archive\n\n```javascript\nconst compressing = require('compressing');\n\nfunction untar(archiveName, destPath) {\n return compressing.tar.uncompress(archiveName, destPath);\n}\n\n\nasync function main() {\n const archivePath = process.argv[2];\n const destPath = \"./output\";\n\n if (archivePath && archivePath.endsWith(\".tar\")) {\n await untar(archivePath, destPath);\n }\n}\n\nmain();\n```\n\n### Attack Results\n\n<img width=\"547\" height=\"161\" alt=\"image\" src=\"https://github.com/user-attachments/assets/5ea12efd-0d3f-4f8a-8414-b3a5c72e153e\" />\n\n\nAfter extraction, the output directory contains a symlink pointing to `/tmp`. The file `poc.txt` is then written through the symlink to `/tmp/poc.txt`, demonstrating an arbitrary file write outside the extraction directory.\n\n## Summary\n\n`compressing` restores symlinks from TAR archives without validating their targets. By combining a malicious symlink with a subsequent file entry, an attacker can redirect extracted files to arbitrary locations on the host.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "compressing"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "2.0.0"
29+
},
30+
{
31+
"fixed": "2.0.1"
32+
}
33+
]
34+
}
35+
],
36+
"versions": [
37+
"2.0.0"
38+
]
39+
},
40+
{
41+
"package": {
42+
"ecosystem": "npm",
43+
"name": "compressing"
44+
},
45+
"ranges": [
46+
{
47+
"type": "ECOSYSTEM",
48+
"events": [
49+
{
50+
"introduced": "0"
51+
},
52+
{
53+
"fixed": "1.10.4"
54+
}
55+
]
56+
}
57+
],
58+
"database_specific": {
59+
"last_known_affected_version_range": "<= 1.10.3"
60+
}
61+
}
62+
],
63+
"references": [
64+
{
65+
"type": "WEB",
66+
"url": "https://github.com/node-modules/compressing/security/advisories/GHSA-cc8f-xg8v-72m3"
67+
},
68+
{
69+
"type": "WEB",
70+
"url": "https://github.com/node-modules/compressing/commit/8d16c196c7f1888fc1af957d9ff36117247cea6c"
71+
},
72+
{
73+
"type": "WEB",
74+
"url": "https://github.com/node-modules/compressing/commit/ce1c0131c401c071c77d5a1425bf8c88cfc16361"
75+
},
76+
{
77+
"type": "PACKAGE",
78+
"url": "https://github.com/node-modules/compressing"
79+
}
80+
],
81+
"database_specific": {
82+
"cwe_ids": [
83+
"CWE-59"
84+
],
85+
"severity": "HIGH",
86+
"github_reviewed": true,
87+
"github_reviewed_at": "2026-02-03T17:42:18Z",
88+
"nvd_published_at": null
89+
}
90+
}
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-gm8q-m8mv-jj5m",
4+
"modified": "2026-02-03T17:43:56Z",
5+
"published": "2026-02-03T17:43:56Z",
6+
"aliases": [
7+
"CVE-2025-64712"
8+
],
9+
"summary": "Unstructured has Path Traversal via Malicious MSG Attachment that Allows Arbitrary File Write",
10+
"details": "A Path Traversal vulnerability in the `partition_msg` function allows an attacker to write or overwrite arbitrary files on the filesystem when processing malicious MSG files with attachments.\n\n ## Impact\n An attacker can craft a malicious .msg file with attachment filenames containing path traversal sequences (e.g.,\n `../../../etc/cron.d/malicious`). When processed with `process_attachments=True`, the library writes the attachment to an\n attacker-controlled path, potentially leading to:\n\n - Arbitrary file overwrite\n - Remote code execution (via overwriting configuration files, cron jobs, or Python packages)\n - Data corruption\n - Denial of service\n\n ## Affected Functionality\n The vulnerability affects the MSG file partitioning functionality when `process_attachments=True` is enabled.\n\n ## Vulnerability Details\n The library does not sanitize attachment filenames in MSG files before using them in file write operations, allowing directory\n traversal sequences to escape the intended output directory.\n\n ## Workarounds\n Until patched, users can:\n - Set `process_attachments=False` when processing untrusted MSG files\n - Avoid processing MSG files from untrusted sources\n - Implement additional filename validation before processing",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "unstructured"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "0.18.18"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 0.18.17"
38+
}
39+
}
40+
],
41+
"references": [
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/Unstructured-IO/unstructured/security/advisories/GHSA-gm8q-m8mv-jj5m"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://github.com/Unstructured-IO/unstructured/commit/b01d35b2373fd087d2e15162b9c021663c97155d"
49+
},
50+
{
51+
"type": "PACKAGE",
52+
"url": "https://github.com/Unstructured-IO/unstructured"
53+
}
54+
],
55+
"database_specific": {
56+
"cwe_ids": [
57+
"CWE-22",
58+
"CWE-73"
59+
],
60+
"severity": "CRITICAL",
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2026-02-03T17:43:56Z",
63+
"nvd_published_at": null
64+
}
65+
}

0 commit comments

Comments
 (0)