GHSA-4cx6-fj7j-pjx9

Suggest an improvement
Source
https://github.com/advisories/GHSA-4cx6-fj7j-pjx9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-4cx6-fj7j-pjx9/GHSA-4cx6-fj7j-pjx9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4cx6-fj7j-pjx9
Aliases
Published
2022-03-10T18:17:50Z
Modified
2024-08-21T14:56:37.320788Z
Severity
  • 7.7 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Code injection in Stripe CLI on windows
Details

Impact

A vulnerability in Stripe CLI exists on Windows when certain commands are run in a directory where an attacker has planted files. The commands are stripe login, stripe config -e, stripe community, and stripe open. MacOS and Linux are unaffected.

An attacker who successfully exploits the vulnerability can run arbitrary code in the context of the current user. The update addresses the vulnerability by throwing an error in these situations before the code can run.

There has been no evidence of exploitation of this vulnerability.

Recommendation

Upgrade to Stripe CLI v1.7.13.

Acknowledgments

Thanks to trungpabc for reporting the issue.

For more information

Email us at security@stripe.com.

Database specific
{
    "nvd_published_at": "2022-03-09T23:15:00Z",
    "github_reviewed_at": "2022-03-10T18:17:50Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-78"
    ]
}
References

Affected packages

Go / github.com/stripe/stripe-cli

Package

Name
github.com/stripe/stripe-cli
View open source insights on deps.dev
Purl
pkg:golang/github.com/stripe/stripe-cli

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.13