We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-45401

stripe-cli Path Traversal vulnerability



Description

stripe-cli is a command-line tool for the payment processor Stripe. A vulnerability exists in stripe-cli starting in version 1.11.1 and prior to version 1.21.3 where a plugin package containing a manifest with a malformed plugin shortname installed using the --archive-url or --archive-path flags can overwrite arbitrary files. The update in version 1.21.3 addresses the path traversal vulnerability by removing the ability to install plugins from an archive URL or path. There has been no evidence of exploitation of this vulnerability.

Reserved 2024-08-28 | Published 2024-09-05 | Updated 2024-12-19 | Assigner GitHub_M


HIGH: 7.6CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

>= 1.11.1, < 1.21.3
affected

References

github.com/...pe-cli/security/advisories/GHSA-fv4g-gwpj-74gr

cve.org (CVE-2024-45401)

nvd.nist.gov (CVE-2024-45401)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-45401

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.