CVE-2024-45401

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-45401
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-45401.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-45401
Aliases
Published
2024-09-05T17:09:08.933Z
Modified
2025-12-05T06:16:30.230060Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
Summary
stripe-cli Path Traversal vulnerability
Details

stripe-cli is a command-line tool for the payment processor Stripe. A vulnerability exists in stripe-cli starting in version 1.11.1 and prior to version 1.21.3 where a plugin package containing a manifest with a malformed plugin shortname installed using the --archive-url or --archive-path flags can overwrite arbitrary files. The update in version 1.21.3 addresses the path traversal vulnerability by removing the ability to install plugins from an archive URL or path. There has been no evidence of exploitation of this vulnerability.

Database specific
{
    "cwe_ids": [
        "CWE-22"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/45xxx/CVE-2024-45401.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/stripe/stripe-cli

Affected ranges

Type
GIT
Repo
https://github.com/stripe/stripe-cli
Events

Affected versions

v1.*

v1.11.1
v1.11.2
v1.11.3
v1.12.0
v1.12.1
v1.12.2
v1.12.3
v1.12.4
v1.13.0
v1.13.1
v1.13.10
v1.13.11
v1.13.12
v1.13.2
v1.13.3
v1.13.4
v1.13.5
v1.13.6
v1.13.7
v1.13.8
v1.13.9
v1.14.0
v1.14.1
v1.14.2
v1.14.3
v1.14.4
v1.14.5
v1.14.6
v1.14.7
v1.15.0
v1.16.0
v1.17.0
v1.17.1
v1.17.2
v1.18.0
v1.19.0
v1.19.1
v1.19.2
v1.19.3
v1.19.4
v1.19.5
v1.20.0
v1.21.0
v1.21.1
v1.21.2

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-45401.json"