-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/weichsel/ZIPFoundation | swift | <= 0.9.17 | 0.9.18 |
The vulnerability stems from two key issues: 1) The symlink creation directly uses untrusted zip entry data without validating the target path remains within the extraction directory. 2) The path containment check (isContained) only validates the entry's own path, not the symlink's destination path. This is evidenced by the GitHub issue showing direct use of linkPath from zip data, the blog post demonstrating symlink escape, and the patch notes mentioning added symlink containment enforcement.