Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-45401
HistorySep 05, 2024 - 5:09 p.m.

CVE-2024-45401 stripe-cli Path Traversal vulnerability

2024-09-0517:09:08
CWE-22
GitHub_M
www.cve.org
2
stripe-cli
path traversal
vulnerability
version 1.11.1
version 1.21.3
plugin package
manifest
archive url
archive path

CVSS3

7.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

EPSS

0

Percentile

11.1%

stripe-cli is a command-line tool for the payment processor Stripe. A vulnerability exists in stripe-cli starting in version 1.11.1 and prior to version 1.21.3 where a plugin package containing a manifest with a malformed plugin shortname installed using the --archive-url or --archive-path flags can overwrite arbitrary files. The update in version 1.21.3 addresses the path traversal vulnerability by removing the ability to install plugins from an archive URL or path. There has been no evidence of exploitation of this vulnerability.

CNA Affected

[
  {
    "vendor": "stripe",
    "product": "stripe-cli",
    "versions": [
      {
        "version": ">= 1.11.1, < 1.21.3",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

EPSS

0

Percentile

11.1%

Related for CVELIST:CVE-2024-45401