data/reports: add GHSA to GO-2021-0094.yaml

Aliases: CVE-2020-29529, GHSA-2g5j-5x95-r6hr

Updates golang/vulndb#94

Change-Id: I87c8fec4db7e920b2335ffb56e9851b1f7bd9a34
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/466142
Reviewed-by: Tim King <taking@google.com>
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
Run-TryBot: Tatiana Bradley <tatianabradley@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
This commit is contained in:
Tatiana Bradley 2023-02-07 19:30:28 +00:00 коммит произвёл Gopher Robot
Родитель b4cc423062
Коммит 3d42cf3203
2 изменённых файлов: 4 добавлений и 1 удалений

Просмотреть файл

@ -3,7 +3,8 @@
"published": "2021-04-14T20:04:52Z",
"modified": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2020-29529"
"CVE-2020-29529",
"GHSA-2g5j-5x95-r6hr"
],
"details": "Protections against directory traversal during archive extraction can be bypassed by chaining multiple symbolic links within the archive. This allows a malicious attacker to cause files to be created outside of the target directory. Additionally if the attacker is able to read extracted files they may create symbolic links to arbitrary files on the system which the unpacker has permissions to read.",
"affected": [

Просмотреть файл

@ -17,6 +17,8 @@ description: |
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-29529
ghsas:
- GHSA-2g5j-5x95-r6hr
references:
- fix: https://github.com/hashicorp/go-slug/pull/12
- fix: https://github.com/hashicorp/go-slug/commit/28cafc59c8da6126a3ae94dfa84181df4073454f